Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

2 min read

Fortigate SSL-VPN Remote Code Execution Vulnerability (CVE-2023-27997)

It's important that organizations deploy last week's "Patch Tuesday" patches as soon as possible. These patches include several critical, high, and important severity vulnerabilities, but more importantly, it addresses 6 vulnerabilities that are known to be under active exploitation by threat actors "in the wild".

Security Advisory Notice:
Fortigate SSL-VPN Remote Code Execution Vulnerability (CVE-2023-27997)


Affected Software / System

This advisory specifically applies to the following Fortinet products:

  • All FortiGate devices running FortiOS with SSL-VPN enabled are potentially at risk.


CVE (if applicable)

  • CVE-2023-27997


Type

Remote Code Execution Vulnerability that would allow a hostile agent to interfere via the VPN, even if the MFA is activated.

 

Exploit Status: 

There are currently no confirmed instances of exploitation “in the wild”. However, further weaponization and exploitation is imminent. 


Rating

CVE-2023-27997
CVSSv3 score:  (Pending)
Severity: Critical


 

Vulnerability Summary

On June 12th, 2023, Olympe CyberDefense, a France-based cyber threat intelligence vendor, posted a security alert on their website about a critical security vulnerability in FortiOS ssl-vpn. The official PRIST Advisory from FortiGaurd Labs has not yet been published but is expected to be officially disclosed on Tuesday, June 13th, 2023. 

According to an advisory by beyondmachines.net, “The security fixes were included in the FortiOS firmware versions which were released on Friday, 9th of June. Fixed versions of FortiOS are:

  • 6.0.17
  • 6.2.15
  • 6.4.13
  • 7.0.12
  • 7.2.5

The firmware release notes do not explicitly mention the RCE vulnerability, but security professionals indicated that these updates silently addressed the issue.”

 

Impact

This RCE vulnerability can allow an unauthenticated attacker to execute arbitrary code via remote devices and could allow the execution of other malicious artifacts.

Once a targeted system is compromised, there is a high risk of an organization's infrastructure backups being corrupted and/or ransomed, as well as a risk of lateral movement by the threat actor.


Mitigations

For clients who can not immediately patch vulnerable systems:

  • Disable SSL-VPN on all Fortinet Devices. Specific firewall rules and steps to disable ssl-vpn can be found here.

For clients who can immediately patch vulnerable systems:

  • Upgrade FortiOS to the latest version as soon as possible.

 

Ingalls MDR Clients Protections:

The Ingalls CTI team is actively engaged in hunting for any of the known indications of compromise at this time and will continue to closely monitor and develop additional detections as they become available. Please notify your assigned Primary Analyst if you suspect that your organization may be breached or require additional threat hunting and analysis.

Ingalls Recommends the Following Actions:

Implement the above mitigation actions on every affected Fortinet appliance in your environment and roll out the latest patches as soon as possible.

 
 
Subscribe to Network Security News