У нас вы можете посмотреть бесплатно Fortinet, Ivanti, and SAP Urgent Security Patches Explained или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this video, we discuss urgent security patches issued by Fortinet, Ivanti, and SAP in response to critical vulnerabilities discovered in their products. What does this mean for your organization and how can you protect yourself? What you’ll learn: We’ll break down the vulnerabilities affecting Fortinet's FortiOS, Ivanti's Endpoint Manager, and SAP's software, detailing the potential risks and the necessary steps to mitigate them. You’ll gain insights into the nature of these vulnerabilities, their implications for cybersecurity, and actionable advice on how to secure your systems effectively. On December 10, 2025, Fortinet, Ivanti, and SAP announced the release of urgent patches to address serious security flaws that could lead to authentication bypass and code execution. Fortinet's vulnerabilities, tracked as CVE-2025-59718 and CVE-2025-59719, affect multiple products including FortiOS and FortiWeb, with a critical CVSS score of 9.8. These vulnerabilities allow unauthenticated attackers to bypass login authentication through a crafted SAML message, particularly if the FortiCloud SSO login feature is enabled. To protect against potential exploitation, Fortinet advises organizations to disable the FortiCloud login feature until updates can be applied. This can be done via the system settings or command line interface, ensuring that administrative access remains secure. Ivanti also issued patches for four vulnerabilities in its Endpoint Manager, including CVE-2025-10573, which has a CVSS score of 9.6. This flaw allows remote unauthenticated attackers to execute arbitrary JavaScript within an administrator session, posing a significant risk due to the ease of exploitation. Security experts emphasize the importance of immediate patching and implementing robust user interface sanitization to mitigate risks associated with such vulnerabilities. Lastly, SAP released December security updates addressing 14 vulnerabilities, including three critical flaws: CVE-2025-42880, CVE-2025-55754, and CVE-2025-42928. These vulnerabilities can lead to code injection and remote code execution, highlighting the need for timely updates to protect critical systems. Onapsis, a security platform, played a key role in identifying these vulnerabilities, underlining the importance of collaboration in cybersecurity. With the frequency of exploitation of vulnerabilities in these software products, it is crucial for organizations to act swiftly to apply the necessary patches. In this video, we will provide detailed insights into the vulnerabilities, their potential impacts, and how organizations can ensure they remain secure in an increasingly threatening digital landscape.