I keep trying to make the hashtag #FortiNOT happen. Stop buying their products folks!
From: @GossiTheDog
https://cyberplace.social/@GossiTheDog/113483673211675864
FortiJump Higher details are out. Even with the patch installed, apparently you can get RCE on FortiManager using a FortiGate it manages. https://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/
Cyberplace@screaminggoat if I had any of these systems in my environment I’d be working 24x7 to replace them
#fortiNOT This image never goes unused for long.
#fortinotSome truly radical opacity from everybody's favorite maker of network security software
https://arstechnica.com/security/2024/10/fortinet-stays-mum-on-critical-0-day-reportedly-under-active-exploitation/
Infosec Exchange@screaminggoat #FortiNOT
I’m trying hard to make that hashtag happen 🙂
lol at this Watchtowr write up - it’s on the money. Vulns from 1998.
Wait until they see the new FortiManager zero day, I wanna see their write up.
https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/
Cyberplace#Fortinot’s walls were shut real tight,
Till 440 gigs took off in flight.
Data's gone, now who’s to blame?
Their firewall’s customers must be insane.
#infosec #fortinet
No one should be buying Fortinet gear right now. Make it painful enough for them so they have to improve their products #FortiNOT #cybersecurity
From: @simontsui
https://infosec.exchange/@simontsui/111902215196225910
Why you should care about CVE-2024-21762:
**Fortinet** vulnerabilities have historically been targeted by People’s Republic of China (PRC) state-sponsored cyber actors. On 19 January 2023, Mandiant [reported](https://www.mandiant.com/resources/blog/chinese-actors-exploit-fortios-flaw) the exploitation of FortiOS SSL VPN vulnerability [CVE-2022-42475](https://nvd.nist.gov/vuln/detail/CVE-2022-42475) as a zero-day by suspected Chinese threat actors. Mandiant published a [subsequent blog post](https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem) on 16 March 2023 detailing the exploitation of another FortiOS zero-day [CVE-2022-41328](https://nvd.nist.gov/vuln/detail/CVE-2022-41328) by the Chinese threat actor UNC3886. CISA, FBI and NSA assess that PRC state-sponsored cyber actors are seeking to position themselves on IT networks for disruptive or destructive cyberattacks against U.S. critical infrastructure in the event of a major crisis or conflict with the United States. CISA’s [joint cybersecurity advisory](https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a) on 07 February 2024 states that Chinese Advanced Persistent Threat (APT) Volt Typhoon likely obtained initial access by exploiting CVE-2022-42475 in a network perimeter FortiGate 300D firewall that was not patched. Fortinet also provided [case studies](https://www.fortinet.com/blog/psirt-blogs/importance-of-patching-an-analysis-of-the-exploitation-of-n-day-vulnerabilities) of Volt Typhoon targeting of manufacturing, consulting, local government, and internet service provider sectors, and post-exploitation activity described as Living Off the Land (LotL) techniques.
#Fortinet #FortiOS #zeroday #activeexploitation #eitw #CVE_2024_21762 #vulnerability #securityadvisory
Infosec Exchange@simontsui hopefully someone starts a
#FortiNOT campaign. No one should be buying their products right now.