HomeCII/OTFortinet addresses vulnerability in FortiOS targeted by attackers for months (CVE-2024-55591)

Fortinet addresses vulnerability in FortiOS targeted by attackers for months (CVE-2024-55591)

Published on

spot_img

Fortinet has recently addressed a critical authentication bypass vulnerability, identified as CVE-2024-55591, that has been exploited by attackers as a zero-day to compromise publicly-exposed FortiGate firewalls. The vulnerability affects FortiOS firewalls and FortiProxy web gateways, allowing remote attackers to gain super-admin privileges through crafted requests to Node.js websocket module, ultimately enabling them to execute unauthorized code or commands.

Acknowledging the in-the-wild exploitation of this vulnerability, Fortinet released a security advisory that included indicators of compromise such as IP addresses, log entries, created users, and a list of operations conducted by the threat actor. This information aligns with findings from Arctic Wolf researchers who detailed an attack campaign involving unauthorized administrative logins, account creations, and SSL VPN authentication that began in mid-November. It is now confirmed that the attackers leveraged the CVE-2024-55591 vulnerability for these malicious activities.

The critical vulnerability impacts FortiOS versions 7.0.0 through 7.0.16, along with FortiProxy versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12. Users have been urged to update to fixed versions (FortiOS 7.0.17 or above, FortiProxy 7.2.13 or above), or apply workarounds if immediate updates are not feasible, such as removing the firewall’s web-based management interface from the public internet.

Arctic Wolf researchers revealed that the attack campaign unfolded in four distinct phases, beginning with automated vulnerability scanning and zero-day exploitation. Subsequent phases involved reconnaissance, creation of new accounts with super admin privileges, and SSL VPN manipulations. Fortunately, the threat actors were removed from affected environments before progressing further, although the ultimate intentions behind the attacks remain uncertain.

In response to the escalating threat landscape posed by state-sponsored hackers targeting corporate networks through zero-day and n-day vulnerabilities, organizations are advised to enhance security measures. Specifically, management interfaces should not be publicly exposed, and access should be restricted to trusted internal users. Monitoring for suspicious activities, such as jsconsole events and unexpected logins from VPS hosting IP addresses, can help detect and mitigate potential threats.

Fortinet has been actively engaging with customers to provide guidance on mitigating risks associated with CVE-2024-55591. The company emphasizes the importance of timely patching, network monitoring, and following the guidelines outlined in their advisory. Collaboration with government agencies and threat research organizations continues to strengthen the response efforts against evolving cyber threats.

As organizations navigate the complexities of cybersecurity defense, proactive measures and collaboration with industry partners remain crucial in safeguarding against emerging vulnerabilities and threat actors. Through ongoing vigilance and strategic actions, enterprises can fortify their security posture and mitigate risks associated with sophisticated cyber attacks.

Source link

Latest articles

STX RAT Conceals Remote Desktop and Exfiltrates Data to Avoid Detection

Emergence of STX RAT: A Stealthy Remote Access Trojan with Infostealer Capabilities A new and...

Why Claude Mythos is Shifting Its Focus from Finding to Fixing Bugs

Shift in Cybersecurity: From Bug Identification to Remediation In an evolving cyber threat landscape, the...

Weak at the Seams – CSO Online

Bridging the Gaps in Cybersecurity: A Focus on Unified Governance Before achieving security credentials in...

Patch Windows Collapse as Time to Exploit Accelerates

In a recent analysis, security expert Wysopal highlighted a concerning trend in the realm...

More like this

STX RAT Conceals Remote Desktop and Exfiltrates Data to Avoid Detection

Emergence of STX RAT: A Stealthy Remote Access Trojan with Infostealer Capabilities A new and...

Why Claude Mythos is Shifting Its Focus from Finding to Fixing Bugs

Shift in Cybersecurity: From Bug Identification to Remediation In an evolving cyber threat landscape, the...

Weak at the Seams – CSO Online

Bridging the Gaps in Cybersecurity: A Focus on Unified Governance Before achieving security credentials in...