Rapid7 Slammed For Revealing Bug Before End Of 90-Day Window

Share post:

Cybersecurity company Rapid7 faced a dispute from tech firm Fortinet after Rapid7 published a report of a vulnerability in a Fortinet product before the company had time to release a patch to fix the issue.

Rapid7 stated that the vulnerability is related to CVE-2021-22123, which was addressed in FG-IR-20-120. The tech company added that users without a patch must “disable the FortiWeb device’s management interface from untrusted networks, including the internet.”

A Fortinet spokesperson criticized Rapid7 for violating the terms of its disclosure agreement. Fortinet has a 90-day Responsible disclosure window. The company stated that it has a clear disclosure policy on its PSIRT Policy page, which states that “asking incident submitters to maintain strict confidentiality until complete resolutions are available for customers.”

The report included a timeline stating that Rapid7 contacted Fortinet in June about the vulnerability, which was acknowledged by Fortinet by June 11. Rapid7 claims that they never received another word from Fortinet until they made the report public on Tuesday.

Fortinet did not respond to further questions about the patch that was supposed to fix the vulnerability.

Rapid7 updated its report to state that Fortiweb 6.4.1 will be released at the end of August and will receive a patch to fix the vulnerability.

Tod Beardsley, research director at Rapid7, said their vulnerability policy included a minimum of 60 days for vulnerability disclosure after initial contact attempts.

Beardsley also mentioned that there is no evidence that the vulnerability has been exploited, so Rapid7 “should be read as a cautionary piece for users of Fortinet’s FortiWeb.”

He stressed that FortiWeb users should not generally expose their administrative interface to the internet and ensure that those with authentication credentials choose solid and very strong passwords.

For more information, read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways