Cybersecurity Advisory: Critical Unauthenticated Remote Code Execution Vulnerability in FortiOS
This security advisory notice addresses the critical unauthenticated remote code execution vulnerability in FortisOS: CVE-2022-42475. Read on to...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
2 min read
Sean Scully : Jun 12, 2023 12:00:00 AM
It's important that organizations deploy last week's "Patch Tuesday" patches as soon as possible. These patches include several critical, high, and important severity vulnerabilities, but more importantly, it addresses 6 vulnerabilities that are known to be under active exploitation by threat actors "in the wild".
This advisory specifically applies to the following Fortinet products:
Remote Code Execution Vulnerability that would allow a hostile agent to interfere via the VPN, even if the MFA is activated.
There are currently no confirmed instances of exploitation “in the wild”. However, further weaponization and exploitation is imminent.
CVE-2023-27997
CVSSv3 score: (Pending)
Severity: Critical
On June 12th, 2023, Olympe CyberDefense, a France-based cyber threat intelligence vendor, posted a security alert on their website about a critical security vulnerability in FortiOS ssl-vpn. The official PRIST Advisory from FortiGaurd Labs has not yet been published but is expected to be officially disclosed on Tuesday, June 13th, 2023.
According to an advisory by beyondmachines.net, “The security fixes were included in the FortiOS firmware versions which were released on Friday, 9th of June. Fixed versions of FortiOS are:
The firmware release notes do not explicitly mention the RCE vulnerability, but security professionals indicated that these updates silently addressed the issue.”
This RCE vulnerability can allow an unauthenticated attacker to execute arbitrary code via remote devices and could allow the execution of other malicious artifacts.
Once a targeted system is compromised, there is a high risk of an organization's infrastructure backups being corrupted and/or ransomed, as well as a risk of lateral movement by the threat actor.
For clients who can not immediately patch vulnerable systems:
For clients who can immediately patch vulnerable systems:
The Ingalls CTI team is actively engaged in hunting for any of the known indications of compromise at this time and will continue to closely monitor and develop additional detections as they become available. Please notify your assigned Primary Analyst if you suspect that your organization may be breached or require additional threat hunting and analysis.
Implement the above mitigation actions on every affected Fortinet appliance in your environment and roll out the latest patches as soon as possible.
This security advisory notice addresses the critical unauthenticated remote code execution vulnerability in FortisOS: CVE-2022-42475. Read on to...
VMWare refers to these two vulnerabilities collectively as VMSA-2021-0010. CVE-2021-21985 - The vSphere Client (HTML5) contains a remote code...
It's important that organizations deploy last week's "Patch Tuesday" patches as soon as possible. These patches include several critical, high, and...