Fortinet Devices Still Compromised: A Persistent Threat to Cybersecurity

 

Fortinet Devices Still Compromised: A Persistent Threat to Cybersecurity

By Edi Rimkus


In a concerning revelation, over 14,000 Fortinet VPN devices remain compromised despite patches being applied to address previous vulnerabilities. This persistent threat highlights the evolving tactics of cybercriminals and the critical need for thorough post-patch audits and proactive cybersecurity measures.

The Issue at Hand

Fortinet devices, specifically those running FortiOS with SSL-VPN functionality, have been targeted by attackers exploiting vulnerabilities dating back as early as 2023. Even after patches were applied, cybercriminals managed to maintain access through a post-exploitation technique involving symbolic links (symlinks). These symlinks act as shortcuts, connecting the user filesystem to the root filesystem, allowing attackers to retain read-only access to sensitive files.

Key Vulnerabilities Exploited

The attackers leveraged several known vulnerabilities, including:

  • CVE-2022-42475

  • CVE-2023-27997

  • CVE-2024-21762

These flaws enabled unauthorized access to device configurations, credentials, and key material. Even after updates were applied, the symlink modifications persisted, evading detection and allowing attackers to maintain access.

Global Impact

The Shadowserver Foundation's scans revealed the widespread nature of this compromise:

  • 14,300 infected devices globally.

  • Countries most affected:

    • United States (1,500 devices)

    • Japan (600 devices)

    • Taiwan (600 devices)

    • China (500 devices)

    • France (500 devices)

Other countries, including Thailand, Turkey, Israel, Italy, Canada, India, Spain, Indonesia, and Malaysia, also reported hundreds of compromised devices.

Real-World Examples

  1. Persistent Access: Attackers used symlinks to maintain access to sensitive files, including device configurations and credentials, even after patches were applied.

  2. Wide-Scale Exploitation: CERT-FR reported a massive campaign involving numerous compromised devices in France, with incidents dating back to early 2023.

  3. Evading Detection: The symlink mechanism allowed attackers to avoid detection by traditional security measures, emphasizing the need for advanced monitoring tools.

Recommendations for Mitigation

Fortinet and cybersecurity agencies worldwide have issued advisories to address this persistent threat:

  1. Upgrade to Latest FortiOS Versions: Ensure devices are updated to versions that can detect and remove symlinks from the filesystem.

  2. Review Configurations: Treat all configurations as potentially compromised and reset exposed credentials.

  3. Disable SSL-VPN Functionality: If patching is not immediately possible, consider disabling SSL-VPN functionality to prevent exploitation.

  4. Conduct Post-Patch Audits: Regularly audit systems after applying patches to ensure no residual vulnerabilities remain.

  5. Implement Advanced Monitoring: Deploy tools capable of detecting unusual activity, such as symlink modifications or unauthorized access attempts.

A Broader Lesson in Cybersecurity

This incident underscores the importance of proactive cybersecurity measures. It’s not enough to rely solely on patches—organizations must adopt a defense-in-depth strategy, combining regular audits, advanced monitoring, and user awareness training to mitigate risks effectively.

Final Thoughts
The persistence of attackers in exploiting Fortinet devices serves as a stark reminder of the evolving nature of cyber threats. By staying vigilant and implementing robust defenses, organizations can better protect themselves against future attacks. Let’s work together to build a safer digital environment.

Comments

Popular posts from this blog

Hadooken: New Linux Malware Exploiting Oracle WebLogic Servers

Critical VMware HCX Vulnerability: What You Need to Know

CVE-2024-8190: An OS Command Injection Vulnerability in Ivanti CSA: What You Need to Know