iTnews

Long list of vulnerable Fortinet SSL VPNs published

By Juha Saarinen on Nov 23, 2020 10:35AM
Long list of vulnerable Fortinet SSL VPNs published

Unpatched after more than a year.

A large list of almost 50,000 internet-reachable Fortinet FortiGate virtual private networking systems that contain an easily exploitable vulnerability has been published on the web and social media.

Attackers can exploit the the path traversal vulnerability to download FortiOS system files remotely with no authentication required, if the secure sockets layer (SSL) VPN service is enabled.

It is possible to obtain the credentials of logged in SSL VPN users this way, Fortinet warned.

The flaw was reported to Fortinet in December 2018, with Taiwanese researchers Meh Chang and Orange Tsai documenting it along with several other vulnerabilities.

Fortinet has issued patched versions of its FortiOS operating system which have been available since May last year.

iTnews was able to find the list of unpatched servers through a vulnerability indexing service.

It is also possible to find potentially vulnerable systems through Google searches, so-called dorking, which find the Fortinet SSL VPN login pages.

The list contains several internet protocol addresses which appear to be assigned to Australian registered domains.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
fortinet fortios security vpn

Partner Content

Tackling cybersecurity in 2021
Partner Content Tackling cybersecurity in 2021
As Australian companies lean more heavily on the cloud, edge security is finding its stride
Partner Content As Australian companies lean more heavily on the cloud, edge security is finding its stride
Why companies fail at picking cloud modernisation partners
Promoted Content Why companies fail at picking cloud modernisation partners
Putting cyber security basics in place
Partner Content Putting cyber security basics in place

Sponsored Whitepapers

Encryption: Protect your most critical data
Encryption: Protect your most critical data
Overcoming data security challenges in a hybrid, multicloud world
Overcoming data security challenges in a hybrid, multicloud world
Move beyond passwords
Move beyond passwords
The top 5 tech trends to deliver business outcomes
The top 5 tech trends to deliver business outcomes
10 reasons why businesses need to invest in cloud security training
10 reasons why businesses need to invest in cloud security training

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By Juha Saarinen
Nov 23 2020
10:35AM
0 Comments

Related Articles

  • Oxfam Australia confirms 'supporter' data accessed in cyber attack
  • Chinese hackers targeted Indian vaccine makers SII, Bharat Biotech
  • MinterEllison makes its IT security 'interventions' easier to understand
  • Oxford University says research not affected after expert flags Covid lab hack
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

TPG Telecom to start enticing NBN customers to move

TPG Telecom to start enticing NBN customers to move

Infosys scores another $40m for Centrelink payments engine build

Infosys scores another $40m for Centrelink payments engine build

Telstra InfraCo opens up telco's own fibre network

Telstra InfraCo opens up telco's own fibre network

Transport for NSW data stolen in Accellion breach

Transport for NSW data stolen in Accellion breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.