Skip to main content

CVE-2024-21762, CVE-2023-27997, and CVE-2022-42475 - FortiGate Vulnerabilities


dips
Forum|alt.badge.img+7
  • Veeam Legend
  • 813 comments

Fortinet Published the following:

https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity

“ The targeting of known, unpatched vulnerabilities by a threat actor is not new and has been previously examined; this specific finding is the result of a threat actor taking advantage of a known vulnerability with a new technique to maintain read-only access to vulnerable FortiGate devices after the original access vector was locked down. Immediately upon discovery, we activated our PSIRT response efforts, developed necessary mitigations and have communicated with affected customers. We continue to work directly with those customers to ensure they have taken steps to remediate the issue. “

Remediations:

  • Upgrade all devices to 7.6.2, 7.4.7, 7.2.11 & 7.0.17 or 6.4.16.
  • Review the configuration of all devices.

3 comments

Chris.Childerhose
Forum|alt.badge.img+21

Thanks for sharing this one Dips.  Going to pass this along to our network folks if they have not already seen it.


matheusgiovanini
Forum|alt.badge.img+5

Great post! Thanks for sharing these critical CVEs.


vAdmin
Forum|alt.badge.img+2
  • Influencer
  • 173 comments
  • April 16, 2025

Thank you for sharing this ​@dips .

 


Comment