“FortiGate Admins Indicate Ongoing Exploitation of 0-Day Flaw; Supplier Stays Mute”

"FortiGate Admins Indicate Ongoing Exploitation of 0-Day Flaw; Supplier Stays Mute"

“FortiGate Admins Indicate Ongoing Exploitation of 0-Day Flaw; Supplier Stays Mute”


# Fortinet Vulnerability: A Serious Zero-Day Exploit Under Ongoing Attack

Recent advancements in cybersecurity have revealed that a significant flaw in Fortinet’s network security software is currently being actively exploited, enabling threat actors to execute remote code on servers. This vulnerability, which has been a topic of discussion within the cybersecurity community for at least nine days, is believed to be exploited by attackers to target sensitive institutions. In spite of the critical nature of this issue, Fortinet has largely refrained from comment, neglecting to issue a public advisory or share detailed information regarding the vulnerability.

## What Is Known Thus Far

Fortinet, a prominent supplier of network security solutions, is under scrutiny for its management of a zero-day vulnerability that permits **Remote Code Execution (RCE)**. It is thought that this vulnerability impacts **FortiManager**, a software tool utilized by organizations for managing network traffic and devices. Reports indicate that attackers have exploited this vulnerability to gain unauthorized entry into FortiManager systems, potentially enabling them to run malicious code on targeted servers.

### Versions of FortiManager Affected

Insights gleaned from a Reddit discussion have identified particular versions of FortiManager that are susceptible to this exploit. The vulnerable versions are:

– **FortiManager 7.6.0 and prior**
– **FortiManager 7.4.4 and prior**
– **FortiManager 7.2.7 and prior**
– **FortiManager 7.0.12 and prior**
– **FortiManager 6.4.14 and prior**

To reduce the risk, users are encouraged to upgrade to the following versions:

– **FortiManager 7.6.1 or higher**
– **FortiManager 7.4.5 or higher**
– **FortiManager 7.2.8 or higher**
– **FortiManager 7.0.13 or higher**
– **FortiManager 6.4.15 or higher**

There are also claims that **FortiManager Cloud**, the cloud-based variant of the software, could be vulnerable too.

### Fortinet’s Lack of Clarity

Despite the extensive discourse surrounding the vulnerability, Fortinet has not issued a public advisory or provided a **CVE (Common Vulnerabilities and Exposures)** designation, which is the standard identifier for security vulnerabilities. This absence of clarity has left numerous customers, security researchers, and journalists uninformed, relying on social media and independent analyses to grasp the issue’s scope and seriousness.

Some administrators have noted receiving notifications from Fortinet recommending software updates, while others have not had such communication. This inconsistent response has heightened the frustration among Fortinet clients, many of whom are now questioning the safety of their systems.

### Characteristics of the Exploit

The flaw appears to originate from a default configuration in FortiManager that permits devices with unfamiliar or unauthorized serial numbers to self-register with an organization’s FortiManager dashboard. This vulnerability could enable attackers to register rogue devices and infiltrate the network.

Independent security researcher **Kevin Beaumont** has actively discussed the situation, sharing insights on platforms like **Mastodon**. According to Beaumont, attackers are registering unauthentic FortiGate devices with hostnames like “localhost” in FortiManager systems, which then facilitates their exploitation of the vulnerability to achieve remote code execution.

A now-removed Reddit comment hinted that attackers might seize a FortiGate certificate from any FortiGate device, register it to a FortiManager instance, and gain illicit access. This would grant them control over the network, potentially allowing them to siphon sensitive information or disrupt normal operations.

### Involvement of Nation-States

There are signs that **nation-state actors**, particularly those from China, have been leveraging this vulnerability for several months. Beaumont has indicated that Chinese state-sponsored hackers have exploited this flaw to breach internal networks since the beginning of this year. This raises alarms about the potential for extensive espionage and cyberattacks aimed at critical infrastructure and sensitive organizations.

### Fortinet’s Track Record with Vulnerability Disclosure

This is not the first instance of Fortinet facing criticism regarding its management of security vulnerabilities. The organization has a pattern of quietly patching critical vulnerabilities without providing public advisories. In several cases, Fortinet has only revealed vulnerabilities after they have been extensively exploited in the real world.

For instance, earlier this year, Fortinet was sluggish to disclose a critical flaw in its **FortiGate VPN** software that was under active exploitation by threat actors. In another case, Fortinet failed to deliver timely updates regarding a vulnerability that allowed attackers to compromise over 20,000 Fortinet VPNs, as reported by Dutch intelligence services.

### Fortinet’s Pledge to Transparency

Fortinet’s Chief Information Security Officer, **Carl Windsor**, recently published a blog entry reaffirming the company’s commitment to “ethical and responsible product development and vulnerability disclosure.” In this post, Windsor stressed Fortinet’s commitment to “radical transparency” and adherence to