Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Australian Businesses at Risk as Threat Actors Exploit Fortinet Vulnerabilities

    Australian Businesses at Risk as Threat Actors Exploit Fortinet Vulnerabilities

    April 15, 2025

    Fortinet Vulnerabilities

    Australian organizations using Fortinet products are being urged to take immediate action following a new advisory highlighting the active exploitation of previously known vulnerabilities. The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued this alert primarily for technical users within organizations across the private and public sectors.

    Fortinet has observed malicious actors exploiting older, unpatched vulnerabilities to gain and maintain unauthorized access to Fortinet devices. While patches were released previously, many compromised devices were either not updated in time or were attacked before security fixes were applied.

    What Happened?

    Fortinet’s latest findings reveal a threat actor is actively targeting three known vulnerabilities:

    • FG-IR-24-015: Out-of-bounds write vulnerability in sslvpnd.
    • FG-IR-23-097: Heap buffer overflow during SSL VPN pre-authentication.
    • FG-IR-22-398: Heap-based buffer overflow in sslvpnd.

    These issues affect the SSL VPN component in Fortinet’s FortiGate devices, which are commonly used by businesses for secure remote access.

    Although Fortinet previously released patches addressing these vulnerabilities, a new technique has been revealed where attackers can retain read-only access to devices even after the original security holes have been patched. This access is achieved by inserting a symbolic link that connects the user and root filesystems through a folder used for serving language files in the SSL VPN.

    The symbolic link avoids detection and allows the attacker to read potentially sensitive information such as device configurations.

    Importantly, devices without SSL VPN enabled are not affected.

    Who Is Affected?

    • Organizations that have not updated their Fortinet devices to the latest versions.
    • Devices that were compromised before patching may still be at risk due to remnants of the attacker’s access method.
    • This threat is not region or industry-specific, and all sectors are encouraged to assess their environments.

    How Was It Discovered?

    Fortinet’s investigation—supported by internal monitoring and collaboration with third-party organizations—uncovered this post-exploitation technique. The discovery triggered the company’s Product Security Incident Response Team (PSIRT) to develop countermeasures and notify impacted customers.

    This new approach by the attacker is a reminder that known vulnerabilities, especially when unpatched, remain an attractive target. Fortinet emphasized that state-sponsored and financially motivated threat actors continue to scan and exploit such vulnerabilities within days of their public disclosure.

    What Should You Do Now?

    The ASD’s ACSC strongly recommends the following:

    1. Upgrade all Fortinet devices immediately to one of the following secure versions:
      • FortiOS 7.6.2, 7.4.7, 7.2.11, 7.0.17, or 6.4.16
    2. Review all configurations on affected devices for signs of modification or compromise.
    3. Investigate your environment for any suspicious behaviour or anomalies in device logs.

    What Has Fortinet Done?

    To help customers secure their environments and prevent further abuse of these vulnerabilities, Fortinet has taken multiple steps:

    • Released updated AV/IPS signatures to detect and remove the symbolic link.
    • Enhanced FortiOS versions to:
      • Detect and remove the symbolic link during updates.
      • Prevent SSL VPNs from serving malicious files.
    • Provided direct communication and assistance to known impacted customers based on internal telemetry.

    These mitigations are automatically applied if customers have the AV/IPS engine enabled and licensed.

    Enhanced Security in New Releases

    Customers upgrading to the latest FortiOS versions will benefit from improved security features, such as:

    • Virtual patching for interim protection before applying formal patches.
    • Firmware integrity validation at the BIOS level.
    • Filesystem integrity monitoring through Integrity Measurement Architecture (IMA).
    • Automatic updates, allowing devices to receive critical patches without manual intervention.
    • Features like Uninterrupted Cluster Upgrade, Auto-restore configurations, and Scheduled patch upgrades for a smoother upgrade process.

    These enhancements are part of Fortinet’s broader commitment to cybersecurity best practices and responsible transparency.

    Why This Matters

    Fortinet’s alert emphasizes a vital principle in cybersecurity: patching alone is not enough if devices are compromised before the fix is applied. Attackers are becoming more advanced, using stealthy techniques like symbolic links to maintain access under the radar.

    The incident also highlights the shared responsibility in cybersecurity:

    • Vendors must deliver secure products, disclose vulnerabilities responsibly, and support customers with quick fixes.
    • Customers must apply patches promptly and maintain strong cyber hygiene to defend against known and emerging threats.

    With more than 40,000 vulnerabilities reported in 2024 alone (as per NIST data), managing security updates has become an essential routine for all IT environments.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleLeonardo AI
    Next Article Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-34049 – OptiLink ONT1GEW Command Injection

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-43701 – Salesforce OmniStudio FlexCards Information Disclosure Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Windows 11 KB5058411 install fails, File Explorer issues (May 2025 Update)

    Operating Systems

    The Razer Blade 14 got the AI laptop treatment with less weight, more ports and speakers, and two colors

    News & Updates

    Highlights

    FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings

    June 10, 2025

    FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings

    Fortinet has disclosed a new security vulnerability affecting its FortiOS SSL-VPN web-mode that allows authenticated users to gain unauthorized access to complete SSL-VPN configuration settings throug …
    Read more

    Published Date:
    Jun 10, 2025 (4 hours, 9 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-25250

    Your ChatGPT Conversations Could Improve with Long-Term Memory feature – Here’s How

    April 14, 2025

    Best early Prime Day TV deals: My 17 favorite sales live now

    June 17, 2025

    CVE-2025-5593 – FreeFloat FTP Server Buffer Overflow Vulnerability

    June 4, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.