Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls
Jan. 13, 2025, 10:44 a.m.
Tags
External References
Description
A recent campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces has been observed. The threat actors gained unauthorized access to the firewalls' administrative controls, created new accounts, established SSL VPN connections, and made various configuration changes. While the initial access vector remains unconfirmed, a zero-day vulnerability is highly suspected. The campaign progressed through four phases: vulnerability scanning, reconnaissance, SSL VPN configuration, and lateral movement. Affected firmware versions ranged from 7.0.14 to 7.0.16. The attackers used jsconsole sessions with spoofed IP addresses and made suspicious configuration changes. Organizations are urged to disable firewall management access on public interfaces immediately to mitigate the risk.
Date
Published: Jan. 11, 2025, 2:10 a.m.
Created: Jan. 11, 2025, 2:10 a.m.
Modified: Jan. 13, 2025, 10:44 a.m.
Attack Patterns
T1078.001
T1003.006
T1136.001
T1190
T1133