Fortinet Fiasco: Hackers Outsmart Patches, Keep Sneaky Access!

Fortinet has disclosed that attackers are keeping read-only access to FortiGate devices even after patching. They’ve cleverly used symbolic links to stick around, evading detection. While Fortinet rolls out updates, the U.S. Cybersecurity and Infrastructure Security Agency urges users to reset credentials and consider disabling SSL-VPN until patches are applied.

Pro Dashboard

Hot Take:

Fortinet’s latest cybersecurity pickle is like a game of whack-a-mole, but the moles are Internet trolls with a penchant for read-only access. They’re sticking around even after the initial party’s over, proving once again that when it comes to cyber threats, you can patch the hole but you can’t always keep the pests out. It’s a classic case of ‘I came, I saw, I left a symlink.’

Key Points:

  • Threat actors are maintaining read-only access to FortiGate devices even after vulnerabilities are patched.
  • Exploited vulnerabilities include CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762.
  • A symbolic link technique was used to maintain access, evading detection.
  • Fortinet released updates to FortiOS to mitigate this issue.
  • CISA and CERT-FR have issued advisories for further protective measures.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?