– Date: 11 June 2023 –
On June 11th, Fortinet issued a new firmware patch fixing an undisclosed pre-authentication remote code execution vulnerability in their FortiOS SSL-PVN. For now there is no extra information that is published by Fortinet. This will be disclosed tomorrow so keep an eye out on their PSIRT page: https://www.fortiguard.com/psirt
❗️An attacker is able to exploit this vulnerability of the SSL-VPN before any authentication occurs. And yes, even with MFA activated.
❗️As of writing this post not much information is available but if an attacker was successful in exploiting this vulnerability, it is possible for them to execute arbitrary code remotely bypassing authentication.
⚠️ SSL VPN Service is one of the most used functionalities in Fortinet Firewalls to provide remote access to employees and collaborators.
⚠️ Because of the popularity of FortiOS devices and many of them being exposed to the Internet, which makes them an extremely popular target.
🛡️ 24×7 monitoring of customer environments
🛡️ Free threat hunting for SOC customers based on the indicators for this attack
🛡️ Personalized assistance to mitigate the risk
🛡️ 24×7 Incident Response (CSIRT) in case of compromise
✅ Update your FortiOS to the versions below:
– 7.2.5
– 7.0.12
– 6.4.13
– 6.2.15
– 6.0.17
✅ Disable the SSL-VPN entirely.
✅ Only allow connections from authorized IP addresses.
✅ Monitor logs for any sign of malicious activity.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
This website uses Google Analytics, Facebook Pixel, LinkedIn Insight tag and the Active Campaign tag to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
More information about our Cookie Policy