Article Details
Scrape Timestamp (UTC): 2024-10-24 05:05:21.652
Original Article Text
Click to Toggle View
Mandiant says new Fortinet flaw has been exploited since June. A new Fortinet FortiManager flaw dubbed "FortiJump" and tracked as CVE-2024-47575 has been exploited since June 2024 in zero-day attacks on over 50 servers, according to a new report by Mandiant. For the past ten days, rumors of an actively exploited FortiManager zero-day have been circulating online after Fortinet privately notified customers in an advanced notification security advisory. Today, Fortinet finally disclosed FortiManager vulnerability, stating it was a missing authentication flaw in the Fortinet created the "FortiGate to FortiManager Protocol" (FGFM) API that allowed unauthenticated attackers to execute commands on the server and managed FortiGate devices. Threat actors could exploit the flaw by utilizing attacker-controlled FortiManager and FortiGate devices with valid certificates to register themselves to any exposed FortiManager server. Once their device was connected, even if it was in an unauthorized state, they could exploit the flaw to execute API commands on the FortiManager and steal configuration data about managed devices. Fortinet has released patches for the CVE-2024-47575 and offered mitigations, such as only allowing specific IP addresses to connect or preventing unknown FortiGate devices from registering using the set fgfm-deny-unknown enable command. Exploited as a zero-day since June Tonight, Mandiant reports that a threat actor tracked as UNC5820 has been exploiting FortiManager devices since as early as June 27, 2024. "UNC5820 staged and exfiltrated the configuration data of the FortiGate devices managed by the exploited FortiManager," reads the new report from Mandiant. "This data contains detailed configuration information of the managed appliances as well as the users and their FortiOS256-hashed passwords." "This data could be used by UNC5820 to further compromise the FortiManager, move laterally to the managed Fortinet devices, and ultimately target the enterprise environment." The first observed attack was seen coming from 45.32.41[.]202, when the threat actors registered an unauthorized FortiManager-VM to an exposed FortiManager server. This device was listed with the name "localhost" and utilized a serial number of "FMG-VMTM23017412," as shown below. As part of the attack, Mandiant says four files were created: In the first observed attack, the email address was "0qsc137p@justdefinition.com," and the company name was "Purity Supreme." Mandiant says they analyzed the memory for a compromised device but found no signs of malicious payloads or tampering with system files. While the attackers did exfiltrate data from devices, Mandiant says there have been no signs that UNC5820 utilized this sensitive information to spread laterally to the managed FortiGate devices or breach networks. At this point, the stolen data may not be as valuable to the attackers, as Mandiant and Fortinet notified customers of the attacks. Hopefully, the customers modified their credentials and took other precautions. As there was no follow-up activity after the initial attacks, Mandiant has not been able to determine the threat actor's goal and where they may be located. "As a result, at the time of publishing, we lack sufficient data to assess actor motivation or location. As additional information becomes available through our investigations, Mandiant will update this blog's attribution assessment," explained Mandiant. Fortinet shared additional information inn its CVE-2024-47575 (FG-IR-24-423) advisory, including mitigation and recovery methods. The advisory also includes additional IOCs, including other IP addresses used by the attackers and log entries for detecting a compromised FortiManager server.
Daily Brief Summary
Mandiant reports that a new zero-day vulnerability in Fortinet's FortiManager, dubbed "FortiJump" and tracked as CVE-2024-47575, has been exploited since June 2024.
The vulnerability allows unauthenticated attackers to execute commands via the FortiGate to FortiManager Protocol (FGFM) API, potentially affecting over 50 servers.
Attackers exploited this flaw by using unauthorized FortiManager and FortiGate devices with valid certificates, registering them to exposed FortiManager servers.
Once connected, these devices could steal configuration data from managed FortiGate devices, including hashed passwords and device settings.
The first detected misuse of this vulnerability emanated from the IP address 45.32.41[.]202 with devices registering under generic or suspicious identifiers.
Fortinet has responded by releasing patches and recommending specific security measures like IP whitelisting and command blocks to prevent unknown device registrations.
Despite the exfiltration of configuration data, Mandiant found no evidence of lateral movement or further network compromise from the collected data.
Mandiant continues to investigate the incident and will update their findings as more information becomes available.