Fortinet is warning that a new critical remote code execution vulnerability in FortiOS SSL VPN is potentially being exploited in attacks.
The flaw received a 9.6 severity rating and is an out-of-bounds write vulnerability in FortiOS that allows unauthenticated attackers to gain remote code execution via maliciously crafted requests.
For those unable to apply patches, you can mitigate the flaw by disabling SSL VPN on your FortiOS devices.
Fortinet's advisory does not provide any details on how the vulnerability is being exploited or who discovered the vulnerability.
This flaw was disclosed today along with CVE-2024-23113, CVE-2023-44487, and CVE-2023-47537.
These flaws are not marked as being exploited in the wild.
Threat actors commonly target Fortinet flaws to breach corporate networks for ransomware attacks and cyber espionage.
Yesterday, Fortinet disclosed that Chinese state-sponsored threat actors known as Volt Typhoon targeted FortiOS vulnerabilities to deploy custom malware known as COATHANGER. This malware is a custom remote access trojan designed to infect Fortigate network security appliances and was recently found used in attacks on the Dutch Ministry of Defence.
Due to the high severity of the newly disclosed CVE-2024-21762 flaw and the likelihood of it being exploited in attacks, it is strongly advised that you update your devices as soon as possible.
Fortinet warns of new FortiSIEM RCE bugs in confusing disclosure.
Chinese hackers hid in US infrastructure network for 5 years.
Chinese hackers fail to rebuild botnet after FBI takedown.
FBI disrupts Chinese botnet by wiping malware from infected routers.
Chinese hackers infect Dutch military network with malware.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 08 Feb 2024 23:15:25 +0000