Fortinet warns that menace actors use a post-exploitation method that helps them preserve read-only entry to beforehand compromised FortiGate VPN units even after the unique assault vector was patched.
Earlier this week, Fortinet started sending emails to prospects warning that their FortiGate/FortiOS units have been compromised primarily based on telemetry acquired from FortiGuard units.
These emails have been titled “Notification of gadget compromise – FortiGate / FortiOS – ** Pressing motion required **,” given a TLP:AMBER+STRICT designation.Â
“This problem isn’t associated to any new vulnerability. This file was left behind by a menace actor following exploitation of earlier identified vulnerabilities,” the emails stated, together with however not restricted to CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762.
After BleepingComputer contacted Fortinet with questions on these emails, the corporate launched an advisory on Thursday warning about this new exploitation method. The advisory says that when the menace actors beforehand breached servers utilizing older vulnerabilities, they created symbolic hyperlinks within the language recordsdata folder to the basis file system on units with SSL-VPN enabled.
This permits them to take care of read-only entry to the basis filesystem via the publicly accessible SSL-VPN internet panel even after they’re found and evicted.
“A menace actor used a identified vulnerability to implement read-only entry to weak FortiGate units. This was achieved through making a symbolic hyperlink connecting the consumer filesystem and the basis filesystem in a folder used to serve language recordsdata for the SSL-VPN. This modification passed off within the consumer filesystem and averted detection,” Fortinet says.
“Subsequently, even when the client gadget was up to date with FortiOS variations that addressed the unique vulnerabilities, this symbolic hyperlink might have been left behind, permitting the menace actor to take care of read-only entry to recordsdata on the gadget’s file system, which can embody configurations.”

​Assaults return to early 2023
Whereas Fortinet did not reveal the precise timeframe of those assaults, the Pc Emergency Response Workforce of France (CERT-FR), a part of the nation’s Nationwide Company for the Safety of Info Programs (ANSSI), revealed on Thursday that this method has been utilized in a large wave of assaults going again to early 2023.
“CERT-FR is conscious of a large marketing campaign involving quite a few compromised units in France. Throughout incident response operations, CERT-FR has realized of compromises occurring since early 2023,” CERT-FR stated.
At this time, CISA additionally suggested community defenders to report any incidents and anomalous exercise associated to Fortinet’s report back to its 24/7 Operations Middle at [email protected] or (888) 282-0870.
Within the emails despatched earlier this week, Fortinet suggested prospects to instantly improve their FortiGuard firewalls to the most recent model of FortiOS (7.6.2, 7.4.7, 7.2.11, 7.0.17, 6.4.16) to take away the malicious recordsdata used for persistence.
Admins have been additionally urged to evaluation gadget configurations instantly and give attention to discovering any surprising adjustments. This assist doc offers additional steerage on resetting probably uncovered credentials on compromised units.
CERT-FR additionally really helpful isolating compromised VPN units from the community, resetting all secrets and techniques (credentials, certificates, identification tokens, cryptographic keys, and many others), and looking for proof of lateral community motion.