A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
Published: 2023-09-07
A joint Cybersecurity Advisory examines the exploitation of two critical vulnerabilities by nation-state threat actors.
Published: 2022-12-12
Fortinet has patched a zero day buffer overflow in FortiOS that could lead to remote code execution. There has been a report of active exploitation and organizations should patch urgently.
https://www.welivesecurity.com/en/eset-research/cosmicbeetle-steps-up-probation-period-ransomhub
https://thehackernews.com/2024/09/cosmicbeetle-deploys-custom-scransom.html
https://thehackernews.com/2024/06/chinese-cyber-espionage-group-exploits.html
https://cloud.google.com/blog/topics/threat-intelligence/uncovering-unc3886-espionage-operations
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a
https://www.tenable.com/blog/aa23-215a-2022s-top-routinely-exploited-vulnerabilities
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://www.tenable.com/blog/volt-typhoon-cybersecurity-advisory
https://thehackernews.com/2023/03/from-ransomware-to-cyber-espionage-55.html
https://www.mandiant.com/resources/blog/zero-days-exploited-2022
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://www.tenable.com/blog/cve-2022-42475-fortinet-patches-zero-day-in-fortios-ssl-vpns