Header image overlay

Security Alerts

Our support will regularly inform you of important events here.

Would you like to be notified by e-mail in case of future Security Alerts? Then sign up here in!

Fortinet has released important security updates for FortiOS firmware versions 6.0, 6.2, 6.4, 7.0, 7.2, 7.4 and 7.6.
An out-of-bounds write vulnerability is thus shielded. You can find more info on this vulnerability at this link.

Take action

The above vulnerability is very critical (CVE score = 9.8) and therefore immediate action is required!

We noticed this remarkable amount of updates being made available yesterday and have proactively anticipated this. So if you have a service contract, you have already been contacted and/or the necessary patches are being rolled out. This further ensures the security of your IT environment.

Don't have a service contract and would like to call on our experts to update your firewall(s)? Then contact us via the info below.

VMware has addressed vulnerabilities hidden in vCenter Server. These vulnerabilities were announced under CVE-2023-34048, CVE-2023-34056. A similar vulnerability was also fixed earlier this year.

A malicious person with network access to vCenter Server could potentially exploit this problem to execute arbitrary code on the underlying operating system.

Take action

The severity of this vulnerability is high (CVE score = 9.8), which means action is required. We recommend that you upgrade vCenter to version 7.0U3o or 8.0U1d. This upgrade will not cause any disruption to your environment and can be performed during business hours.

Given the urgency of the situation, we are implementing these upgrades proactively at our Managed Services clients.

Do you have questions about this or do you, as a non-Managed Services customer, still want support? Please do not hesitate to contact us: support@vanroey.be.

Citrix recently a security bulletin released regarding NetScaler ADC and NetScaler Gateway. This includes multiple vulnerabilities with identifiers CVE-2023-3466, CVE-2023-3467, CVE-2023-3519.

A malicious person could potentially exploit this problem remotely to execute arbitrary code.

Take action

The severity of this vulnerability is high (CVE score = 9.8), which means action is required. We recommend that you upgrade Netscaler to the latest version according to Citrix recommendations.

Given the urgency of the situation, we contacted  proactive our Managed Services clients who are using Citrix NetScaler to schedule the update.

Do you have questions about this or do you, as a non-Managed Services customer, still want support? Please do not hesitate to contact us: support@vanroey.be.

VMware recently addressed multiple memory corruption vulnerabilities in vCenter Server that can be exploited to execute external code. These vulnerabilities, designated CVE-2023-20892 to CVE-2023-20896, are in the software implementation of the DCERPC protocol.

A malicious person with network access to vCenter Server could potentially exploit this problem to execute arbitrary code on the underlying operating system hosting vCenter Server.

Take action

The severity of this vulnerability is high (CVE score = 5.9-8.1), which means action is required. We recommend that you upgrade vCenter to version 7.0U3m or 8.0 U1b, released on 22 June 2023. This upgrade will not cause any disruption to your environment and can be performed during business hours.

Given the urgency of the situation, we are implementing these upgrades proactively at our Managed Services clients.

Do you have questions about this or do you, as a non-Managed Services customer, still want support? Please do not hesitate to contact us: support@vanroey.be.

Fortinet has released important security updates for FortiOS firmware versions 6.0, 6.2, 6.4, 7.0 and 7.2. An official communication regarding a possible leak is not yet available, but it is suggested that it is a critical SSL-VPN RCE vulnerability that this update fixes.

Take action

The above vulnerability is very critical (CVE score = 9.2) and therefore immediate action is required! Customers with a service contract whose environment we can remotely access will be patched after business hours (7pm).

Don't have a service contract and would like to call on our experts to update your firewall(s)? Then contact us via the info below.

To take the security level within Microsoft 365 to the highest level, geolocation is often used. Only login attempts from trusted countries are allowed here.Microsoft has recently IPv6 enabled in Azure AD, which causes problems with Conditional Access rules for some customers. This results, among other things, in unjustified blocking of login attempts.

Are you experiencing problems, are users no longer logged on and would you like to call on our expertise? Then contact our helpdesk via support@vanroey.be or the phone number 014 47 06 00.

What will the future bring? Get an exclusive tour & plenty of inspiring sessions at the revamped Living Tomorrow. It promises to be another great and educational year-end event! See you there?

Attention: limited number of places!