In December network security vendor Fortinet disclosed that a critical vulnerability in its FortiOS operating system was being exploited by attackers in the wild. This week, after additional analysis, the company released more details about a sophisticated malware implant that those attackers deployed through the flaw.
Based on currently available information, the original zero-day attack was highly targeted to government-related entities. However, since the vulnerability has been known for over a month, all customers should patch it as soon as possible as more attackers could start using it.
Remote code execution in FortiOS SSL-VPN
The vulnerability, tracked as CVE-2022-42475, is in the SSL-VPN functionality of FortiOS and can be exploited by remote attackers without authentication. Successful exploitation can result in the execution of arbitrary code and commands.
More Stories
Ransomware reaches a record high, but payouts are dwindling
Will you be shedding a tear for the cybercriminals? Read more in my article on the Tripwire blog. Read More
Cyble Urges Critical Vulnerability Fixes Affecting Industrial Systems
Rockwell Automation, Hitachi Energy and Inaba Denki Sangyo have products affected by critical vulnerabilities carrying severity ratings as high as...
Reimagining Democracy
Imagine that all of us—all of society—have landed on some alien planet and need to form a government: clean slate....
China-based SMS Phishing Triad Pivots to Banks
China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple...
Google Cloud: China Achieves “Cyber Superpower” Status
Google Cloud’s Sandra Joyce said that Chinese state actors’ advanced techniques and ability to stay undetected pose huge challenges Read...
Google Cloud: CISOs Demand Simplified Security Tools Amid Growing Tech Complexity
Google Cloud announced a number of security products designed to reduce complexity for security leaders Read More