New Fortinet bug under active exploitation

By
Follow google news

Overflow may allow remote code execution.

Fortinet has warned customers to patch immediately against a new vulnerability it said is under active exploitation.

New Fortinet bug under active exploitation

The critical-rated vulnerability exists in a VPN product, FortiOS SSL-VPN.

In its advisory, the company said the bug is a heap-based buffer overflow.

It “may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests”, the company said.

As well as installing patches, the company said admins should check their systems for indicators of compromise.

These include multiple log entries indicating the SSL VPN daemon has crashed; and the presence of the following artefacts on a system: libips.bak, libgif.so, libiptcp.so, libipudp.so, libjepg.so, .sslvpnconfigbk, wxd.conf, and a /flash directory.

A compromised system might also show connections to what Fortinet calls “suspicious IP addresses”: 188.34.130.40:444; 103.131.189.143:30080, along with 30081, 30443, and 20443; 192.36.119.61:8443 and 444; and 172.247.168.153:8033. 

The addresses are hosted variously in Iran, Sweden and the United States, according to the DNS lookup tool Robtex.

The vulnerability is present in eight branches of the Fortios SSL-VPN software, and all have been patched.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Supply chain attack hits 100 million-download Axios npm package

Supply chain attack hits 100 million-download Axios npm package

NAB is co-designing a SIEM with Databricks

NAB is co-designing a SIEM with Databricks

APRA pulls data submission system after security pentest

APRA pulls data submission system after security pentest

Councils push for federal shared security centre funding

Councils push for federal shared security centre funding

Log In

  |  Forgot your password?