Fortinet FortiOS vulnerabilities are being actively exploited

Malicious actors are exploiting the flaws to gain access to systems belonging to government and commercial entities

US agencies have warned of vulnerabilities in Fortinet's FortiOS that malicious actors are exploiting to gain access to systems belonging to government and commercial entities.

The FBI and US Cybersecurity and Infrastructure Security Agency (CISA) released a statement detailing that they had observed Advanced Persistent Threat (APT) actors scanning devices for a number of vulnerabilities.

The agencies warned that it was likely the hackers were looking to gain access to multiple government, commercial and technology services networks.

“APT actors have historically exploited critical vulnerabilities to conduct distributed denial-of-service (DDoS) attacks, ransomware attacks, structured query language (SQL) injection attacks, spearphishing campaigns, website defacements, and disinformation campaigns,” stated the group.

The FBI and CISA explained that the APT actors are using multiple CVEs to exploit Fortinet FortiOS vulnerabilities - CVE 2018-13379, CVE-2020-12812, and CVE-2019-5591.

The first exploit, CVE 2018-13379, allows an attacker to download system files via special crafted HTTP resource requests. It has a CVSS score of 9.8 according to the National Vulnerability Database.

The second vulnerability is CVE-2020-12812 which may result in a user being able to log in successfully without being prompted for a second factor of authentication if they changed the case of their username. It also has a critical CVSS score of 9.8.

Related Resource

Security best practices for PostgreSQL

Securing data with PostgreSQL

Security best practices for PostgreSQL - whitepaper from EDBDownload now

The third vulnerability, CVE-2019-5591, allows unauthenticated attackers on the same FortiOS subnet to intercept sensitive information by impersonating the LDAP server. It has a high CVSS score of 7.5.

The agencies have also published a number of recommendations on the steps organisations should take to protect themselves. This includes immediately patching the three vulnerabilities, regularly back up data and password protect backup copies offline, require administrator credentials to install software and more.

In February, the CISA issued a warning that organisations using the Acellion File Transfer Appliance (FTA) were being targeted in attacks. Hackers had reportedly been exploiting the vulnerabilities to attack multiple federal and state government and private organisations. Attacks were also observed around the world, including in Australia, the UK and Singapore.

Featured Resources

The challenge of securing the remote working employee

The IT Pro Guide to Sase and successful digital transformation

Free Download

VMware Cloud workload migration tools

Cloud migration types, phases, and strategies

Free download

Practices for maximising the business value of digital infrastructure Consumption-as- a-Service subscriptions

IDC PeerScape

Free Download

Container network security guide for dummies

Enforcing Kubernetes best practices

Free download

Recommended

Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Synology DiskStation DS2422+ review: A cube of great capacity
network attached storage (NAS)

Synology DiskStation DS2422+ review: A cube of great capacity

10 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022