A zero-day critical security vulnerability (score of 9.8 out of 10) has been identified in FortiManager, Fortinet's centralized management platform for FortiGate devices.
This RCE (Remote Code Execution ) vulnerability presents the risk that a malicious individual could remotely execute arbitrary code on a machine, without requiring authentication. For those who want to know more about RCE vulnerabilities, please consult this blog post.
Exploitation observed
The very first exploits of the zero-day vulnerability date back to June 2024. The only cases of active exploitation of the vulnerability involve a new cybercriminal group named UNC5820.
Systems affected
Older FortiAnalyzer models, including 1000E, 1000F, 2000E, 3000E, 3000F, 3000G, 3500E, 3500F, 3500G, 3700F, 3700G and 3900E, are also affected by this vulnerability if FortiManager is enabled.
Indicators of compromise (IOC)
The following IP addresses (IOC) have been involved in attempts to exploit this vulnerability.
Recommendations
1 - Migrate to the following FortiManager versions:
2 - Block the IOCs associated with the exploitation of this vulnerability.
3 - In addition to these recommendations, Streamscan strongly suggests that you implement the following measures to control access to all your security devices, such as firewalls:
What Streamscan does to protect you
If you are a Streamscan partner: