Today > 1 Critical | 6 High | 24 Medium vulnerabilities   -   You can now download lists of IOCs here!

Attackers exploiting a FortiClient EMS vulnerability in the wild

Dec. 19, 2024, 5:38 p.m.

Description

Kaspersky's GERT team identified an attack exploiting a patched vulnerability (CVE-2023-48788) in FortiClient EMS versions 7.0.1 to 7.0.10 and 7.2.0 to 7.2.2. The attackers used SQL injection to infiltrate a company's network through an exposed Windows server. They deployed remote access tools like ScreenConnect and AnyDesk, performed network enumeration, credential theft, and defense evasion. The vulnerability allows unauthorized code execution via specially crafted data packets. Multiple threat actors have been observed exploiting this vulnerability globally, targeting various companies and consistently altering ScreenConnect subdomains. The analysis highlights the importance of timely patching and implementing additional security controls to prevent such attacks.

Date

Published: Dec. 19, 2024, 2:41 p.m.

Created: Dec. 19, 2024, 2:41 p.m.

Modified: Dec. 19, 2024, 5:38 p.m.

Attack Patterns

T1078.002

T1059.001

T1555

T1562.001

T1021

T1105

T1570

T1190