New Fortinet bug under active exploitation

By

Overflow may allow remote code execution.

Fortinet has warned customers to patch immediately against a new vulnerability it said is under active exploitation.

New Fortinet bug under active exploitation

The critical-rated vulnerability exists in a VPN product, FortiOS SSL-VPN.

In its advisory, the company said the bug is a heap-based buffer overflow.

It “may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests”, the company said.

As well as installing patches, the company said admins should check their systems for indicators of compromise.

These include multiple log entries indicating the SSL VPN daemon has crashed; and the presence of the following artefacts on a system: libips.bak, libgif.so, libiptcp.so, libipudp.so, libjepg.so, .sslvpnconfigbk, wxd.conf, and a /flash directory.

A compromised system might also show connections to what Fortinet calls “suspicious IP addresses”: 188.34.130.40:444; 103.131.189.143:30080, along with 30081, 30443, and 20443; 192.36.119.61:8443 and 444; and 172.247.168.153:8033. 

The addresses are hosted variously in Iran, Sweden and the United States, according to the DNS lookup tool Robtex.

The vulnerability is present in eight branches of the Fortios SSL-VPN software, and all have been patched.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Ex-student charged over Western Sydney University cyberattacks

Ex-student charged over Western Sydney University cyberattacks

SA Water plans 'once-in-a-generation' core technology uplift

SA Water plans 'once-in-a-generation' core technology uplift

WhatsApp banned on US House of Representatives devices

WhatsApp banned on US House of Representatives devices

Victoria's first government tech chief steps down

Victoria's first government tech chief steps down

Log In

  |  Forgot your password?