Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 3
44 résultats taggé Fortinet  ✕
Fortinet admins report patched FortiGate firewalls getting hacked https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/
21/01/2026 22:12:20
QRCode
archive.org
thumbnail

bleepingcomputer.com
By Sergiu Gatlan
January 21, 2026 12:49 PM

Fortinet customers are seeing attackers exploiting a patch bypass for a previously fixed critical FortiGate authentication vulnerability (CVE-2025-59718) to hack patched firewalls.

Fortinet customers are seeing attackers exploiting a patch bypass for a previously fixed critical FortiGate authentication vulnerability (CVE-2025-59718) to hack patched firewalls.

One of the affected admins said that Fortinet has allegedly confirmed that the latest FortiOS version (7.4.10) didn't fully address this authentication bypass vulnerability, which should've been patched in early December with the release of FortiOS 7.4.9.

Fortinet is also reportedly planning to release FortiOS 7.4.11, 7.6.6, and 8.0.0 over the coming days to fully patch the security flaw.

"We just had a malicious SSO login on one of our FortiGate's running on 7.4.9 (FGT60F). We have a SIEM that caught the local admin account being created. Now, I have done a little research, and it appears this is exactly how it looked when someone came in on CVE-2025-59718. But we have been on 7.4.9 since December 30th," the admin said.

The customer shared logs showing that the admin user was created from an SSO login of cloud-init@mail.io from IP address 104.28.244.114. These logs looked similar to previous exploitation of CVE-2025-59718 seen by cybersecurity company Arctic Wolf in December 2025, which reported that attackers were actively exploiting the vulnerability via maliciously crafted SAML messages to compromise admin accounts.

"We observed the same activity. Also running 7.4.9. Same user login and IP address. Created a new system admin user named "helpdesk". We have an open ticket with support. Update: The Fortinet developer team has confirmed the vulnerability persists or is not fixed in v7.4.10," another one added.

BleepingComputer reached out to Fortinet multiple times this week with questions about these reports, but the company has yet to reply.

Until Fortinet provides a fully patched FortiOS release, admins are advised to temporarily disable the vulnerable FortiCloud login feature (if enabled) to secure their systems against attacks.

To disable FortiCloud login, you have to navigate to System -> Settings and switch "Allow administrative login using FortiCloud SSO" to Off. However, you can also run the following commands from the command-line interface:

config system global
set admin-forticloud-sso-login disable
end
Luckily, as Fortinet explains in its original advisory, the FortiCloud single sign-on (SSO) feature targeted in the attacks is not enabled by default when the device is not FortiCare-registered, which should reduce the total number of vulnerable devices.

However, Shadowserver still found over 25,000 Fortinet devices exposed online with FortiCloud SSO enabled in mid-December. At the moment, more than half have been secured, with Shadowserver now tracking just over 11,000 that are still reachable over the Internet.

CISA has also added the CVE-2025-59718 FortiCloud SSO auth bypass flaw to its list of actively exploited vulnerabilities, ordering federal agencies to patch within a week.

Hackers are now also actively exploiting a critical Fortinet FortiSIEM vulnerability with publicly available proof-of-concept exploit code that can enable them to gain code execution with root privileges on unpatched devices.

bleepingcomputer.com EN 2026 Bypass CVE-2025-59718 Firewall Fortigate Fortinet FortiOS Warning Zero-Day
CVE-2025-32756: Fortinet RCE Exploited in the Wild https://horizon3.ai/attack-research/attack-blogs/cve-2025-32756-low-rise-jeans-are-back-and-so-are-buffer-overflows/
02/06/2025 20:30:37
QRCode
archive.org
thumbnail

On May 13, 2025, FortiGuard Labs published an advisory detailing CVE-2025-32756, which affects a variety of Fortinet products:

FortiCamera
FortiMail
FortiNDR
FortiRecorder
FortiVoice
In their advisory, FortiGuard Labs states that Fortinet has observed this issue being exploited in the wild. The next day, May 14, the vulnerability was added to the CISA KEV catalog.

The vulnerability is described in the advisory as a stack-based buffer overflow in the administrative API that can lead to unauthenticated remote code execution. Given that it’s being exploited in the wild, we figured we’d take a closer look. If you’d rather run the test instead of reading this write-up, coverage is already available in NodeZero.

horizon3 EN CVE-2025-32756 Fortinet RCE vulnerability
New Rust Botnet "RustoBot" is Routed via Routers https://www.fortinet.com/blog/threat-research/new-rust-botnet-rustobot-is-routed-via-routers
23/04/2025 08:30:04
QRCode
archive.org

FortiGuard Labs recently discovered a new botnet propagating through TOTOLINK devices. Learn more about this malware targeting these devices.

fortinet EN 2025 TOTOLINK Botnet Rust Routers RustoBot malware
Threat Actor Allegedly Selling Fortinet Firewall Zero-Day Exploit https://www.securityweek.com/threat-actor-allegedly-selling-fortinet-firewall-zero-day-exploit/
20/04/2025 12:44:39
QRCode
archive.org

A threat actor claims to offer a zero-day exploit for an unauthenticated remote code execution vulnerability in Fortinet firewalls.

securityweek EN 2025 Threat-Actor Selling Fortinet Firewall Zero-Day Exploit darkweb
Analysis of Threat Actor Activity https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity
13/04/2025 12:50:41
QRCode
archive.org

Fortinet diligently balances our commitment to the security of our customers and our culture of responsible transparency and commits to sharing information with that goal in mind. While efforts by threat actors to exploit known vulnerabilities are not new, recent Fortinet investigations have discovered a post exploitation technique used by a threat actor. This blog offers analysis of that finding to help our customers make informed decisions.

fortinet EN 2025 EN CVE-2022-42475 exploit vulnerabilities CVE-2023-27997 CVE-2024-21762
New Ransomware Operator Exploits Fortinet Vulnerability Duo https://www.forescout.com/blog/new-ransomware-operator-exploits-fortinet-vulnerability-duo/
14/03/2025 17:19:23
QRCode
archive.org

Between late January and early March, Forescout Research – Vedere Labs identified a series of intrusions based on two Fortinet vulnerabilities. It began with the exploitation of Fortigate firewall appliances — culminating in the deployment of a newly discovered ransomware strain we have dubbed SuperBlack.

forescout EN 2025 Fortinet vulnerabilities SuperBlack ransomware
Fortinet discloses second firewall auth bypass patched in January https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/
12/02/2025 08:42:05
QRCode
archive.org
thumbnail

Fortinet has disclosed a second authentication bypass vulnerability that was fixed as part of a January 2025 update for FortiOS and FortiProxy devices.

bleepingcomputer Actively-Exploited Authentication-Bypass Fortinet FortiOS FortiProxy Zero-Day
Analysis of Threat Actor Data Postin https://www.https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-data-posting.com/blog/psirt-blogs/analysis-of-threat-actor-data-posting
17/01/2025 11:42:17
QRCode
archive.org

This blog analysis regarding a recent threat actor posting, which claims to offer compromised configuration and VPN credentials from FortiGate devices, provides factual information to help our customers better understand the situation and make informed decisions.

fortinet EN analysis Exposure config.conf CVE-2022-40684 analysis
Botnets Continue to Target Aging D-Link Vulnerabilities https://www.fortinet.com/blog/threat-research/botnets-continue-to-target-aging-d-link-vulnerabilities
27/12/2024 11:35:17
QRCode
archive.org
thumbnail

FortiGuard Labs recently noticed that attackers still use and deliver two different botnets via D-Link exposing a HNAP interface weakness. Learn more.

fortinet EN 2024 D-Link botnet HNAP CAPSAICIN FICORA
FortiClient VPN Logging Blind Spot Revealed https://pentera.io/blog/FortiClient-VPN_logging-blind-spot-revealed/
21/11/2024 16:01:38
QRCode
archive.org
thumbnail

Security research that presents a method to automatically validate credentials against Fortinet VPN servers by uncovering an exploit that attackers can use to compromise countless organizations.

pentera EN research Fortinet VPN Logging Blind Spot brute-force
Threat Campaign Spreads Winos4.0 Through Game Application https://www.fortinet.com/blog/threat-research/threat-campaign-spreads-winos4-through-game-application
11/11/2024 09:10:49
QRCode
archive.org
thumbnail

FortiGuard Labs reveals a threat actor spreads Winos4.0, infiltrating gaming apps and targeting the education sector. Learn more.

fortinet EN 2024 Campaign Spreads Winos4.0 Game Application
New Campaign Uses Remcos RAT to Exploit Victims https://www.fortinet.com/blog/threat-research/new-campaign-uses-remcos-rat-to-exploit-victims
08/11/2024 17:16:39
QRCode
archive.org
thumbnail

See how threat actors have abused Remcos to collect sensitive information from victims and remotely control their computers to perform further malicious acts.

Fortinet EN 2024 research Remcos RAT
Fortinet FortiManager CVE-2024-47575 Exploited in Zero-Day Attacks https://www.rapid7.com/blog/post/2024/10/23/etr-fortinet-fortimanager-cve-2024-47575-exploited-in-zero-day-attacks/
23/10/2024 18:45:31
QRCode
archive.org
thumbnail

On Wednesday, October 23, 2024, security company Fortinet published an advisory on CVE-2024-47575, a critical zero-day vulnerability affecting their FortiManager network management solution. The vulnerability arises from a missing authentication for a critical function [CWE-306] in the FortiManager fgfmd daemon that allows a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests. The vulnerability carries a CVSS v3 score of 9.8.

rapid7 EN 2024 Fortinet FortiManager CVE-2024-47575 Zero-Day
Fortinet releases patches for undisclosed critical FortiManager vulnerability - Help Net Security https://www.helpnetsecurity.com/2024/10/21/fortimanager-critical-vulnerability/
22/10/2024 15:45:17
QRCode
archive.org
thumbnail

Fortinet has released critical security updates for FortiManager, to fix a critical vulnerability that is reportedly being exploited.

helpnetsecurity EN 2024 FortiManager Fortinet exploited
Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA https://www.fortinet.com/blog/threat-research/burning-zero-days-suspected-nation-state-adversary-targets-ivanti-csa
21/10/2024 21:14:10
QRCode
archive.org
thumbnail

A case where an advanced adversary was observed exploiting three vulnerabilities affecting the Ivanti Cloud Services Appliance (CSA). This incident is a prime example of how threat actors chain zero-day vulnerabilities to gain initial access to a victim’s network. Learn more.

fortinet EN 2024 Ivanti Cloud Services Appliance CSA CVE-2024-8190
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/
14/10/2024 21:25:41
QRCode
archive.org
thumbnail

It affected (before patching) all currently-maintained branches, and recently was highlighted by CISA as being exploited-in-the-wild.

This must be the first time real-world attackers have reversed a patch, and reproduced a vulnerability, before some dastardly researchers released a detection artefact generator tool of their own. /s

At watchTowr's core, we're all about identifying and validating ways into organisations - sometimes through vulnerabilities in network border appliances - without requiring such luxuries as credentials or asset lists.

watchtowr EN 2024 Fortinet FortiGate CVE-2024-23113 PoC vulnerabilty analysis
Fortinet suffers third-party data breach affecting Asia-Pacific customers - Cyber Daily https://www.cyberdaily.au/security/11098-fortinet-suffers-third-party-data-breach-affecting-asia-pacific-customers
12/09/2024 16:13:59
QRCode
archive.org
thumbnail

International cyber security giant Fortinet has disclosed that it has suffered a data breach.

cyberdaily EN 2024 Fortinet Data-Breach
Exploiting CVE-2024-21412: A Stealer Campaign Unleashed https://www.fortinet.com/blog/threat-research/exploiting-cve-2024-21412-stealer-campaign-unleashed
24/07/2024 20:44:05
QRCode
archive.org
thumbnail

FortiGuard Labs has observed a stealer campaign spreading multiple files that exploit CVE-2024-21412 to download malicious executable files. Read more.

fortinet EN 2024 CVE-2024-21412 Stealer Campaign IoCs
Multiple flaws in Fortinet FortiOS fixed https://securityaffairs.com/164494/security/fortios-high-severity-code-execution-flaws.html?amp
14/06/2024 08:13:37
QRCode
archive.org
thumbnail

Fortinet released security updates to address multiple vulnerabilities in FortiOS, including a high-severity code execution security issue.

securityaffairs EN 2024 Multiple flaws Fortinet FortiOS CVE-2024-23110
Menace Unleashed: Excel File Deploys Cobalt Strike at Ukraine | Fortinet Blog https://www.fortinet.com/blog/threat-research/menace-unleashed-excel-file-deploys-cobalt-strike-at-ukraine
09/06/2024 16:31:33
QRCode
archive.org
thumbnail

FortiGuard Labs has recently identified a sophisticated cyberattack involving an Excel file embedded with a VBA macro designed to deploy a DLL file. Learn more.

fortinet EN 2024 excel FortiGuard-Labs-Threat-Research ukraine Cobalt-Strike
page 1 / 3
4995 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn