{"id":2762,"date":"2024-10-23T17:05:37","date_gmt":"2024-10-23T16:05:37","guid":{"rendered":"https:\/\/aegislens.com\/home\/?p=2762"},"modified":"2024-10-23T17:05:37","modified_gmt":"2024-10-23T16:05:37","slug":"critical-alert-fortinet-highlights-new-fortimanager-flaw-utilized-in-latest-zero-day-attacks","status":"publish","type":"post","link":"https:\/\/aegislens.com\/home\/critical-alert-fortinet-highlights-new-fortimanager-flaw-utilized-in-latest-zero-day-attacks\/","title":{"rendered":"Critical Alert: Fortinet Highlights New FortiManager Flaw Utilized in Latest Zero-Day Attacks"},"content":{"rendered":"<article>\n<h1>Fortinet Warns of New Critical FortiManager Flaw Used in Zero-Day Attacks<\/h1>\n<p>In a statement released today, cybersecurity giant Fortinet has publicly disclosed a critical vulnerability in its FortiManager API system.<\/p>\n<p>This vulnerability, tracked as CVE-2024-47575, is causing waves in the cybersecurity community as it has been exploited in zero-day attacks to access and exfiltrate sensitive files.<\/p>\n<p>These include configurations, IP addresses, and credentials for managed devices.<\/p>\n<h2>An Unsettling Discovery<\/h2>\n<p>Researchers discovered that malevolent actors could manipulate an API endpoint in the FortiManager system, enabling them to bypass security measures and access highly confidential information.<\/p>\n<p>This constitutes a significant escalation in the level of threats posed by software flaws and raises concerns about data integrity in organizations using Fortinet&#8217;s solutions.<\/p>\n<h2>A Critical Classification<\/h2>\n<p>The Common Vulnerability Scoring System (CVSS), an industry standard for assessing the severity of computer system security vulnerabilities, has assigned the CVE-2024-47575 an alarming 9.4 out of 10 \u2014 an explicit indication of its critical severity.<\/p>\n<h2>The Response<\/h2>\n<p>Fortinet acted promptly to mitigate the issue.<\/p>\n<p>The software patch released to address this flaw (FortiManager version 7.0.1), inhibits any unauthorized individual&#8217;s ability to access the data.<\/p>\n<p>Fortinet advises users running older versions of the software to update immediately to the latest patched versions to safeguard their systems.<\/p>\n<h2>Advice for Prevention<\/h2>\n<p>While Fortinet took a significant first step in releasing the patch, cybersecurity professionals advise further steps for maximum security.<\/p>\n<p>The timely application of updates and patches, coupled with enhancing endpoint security, and strict control of user permissions, can vastly reduce the risk of future exploitation.<\/p>\n<h2>Historical Relevance<\/h2>\n<p>This is not the first time Fortinet has been targeted.<\/p>\n<p>Similar zero-day attacks took place last year involving the FortiGate SSL VPN product.<\/p>\n<p>Proactive actions, such as routine audits of system permissions, continuous monitoring, and swift incident response played a critical role in preventing widespread damage.<\/p>\n<h3>Follow-Up Reading<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.cybersecurity-insight.com\/fortinet-zero-day-attacks\">Fortinet: Staying Ahead of Zero-Day Attacks<\/a><\/li>\n<li><a href=\"https:\/\/www.techreview.com\/fortinet-cybersecurity-solutions\">Understanding the Fortinet Cybersecurity Solution Suite<\/a><\/li>\n<li><a href=\"https:\/\/www.securityfocus.com\/critical-cyber-threats\">Dealing with Critical Cyber Threats: Prevention and Response<\/a><\/li>\n<\/ul>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>Fortinet Warns of New Critical FortiManager Flaw Used in Zero-Day Attacks In a statement released<\/p>\n","protected":false},"author":1,"featured_media":2764,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-2762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news","pmpro-has-access"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/2762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/comments?post=2762"}],"version-history":[{"count":1,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/2762\/revisions"}],"predecessor-version":[{"id":2765,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/2762\/revisions\/2765"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media\/2764"}],"wp:attachment":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media?parent=2762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/categories?post=2762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/tags?post=2762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}