Security Experts:

Connect with us

Hi, what are you looking for?



APTs Exploiting Enterprise VPN Vulnerabilities, UK Govt Warns

Advanced persistent threat (APT) actors have been exploiting recently disclosed vulnerabilities affecting enterprise VPN products from Fortinet, Palo Alto Networks and Pulse Secure, the UK’s National Cyber Security Centre (NCSC) warns.

Advanced persistent threat (APT) actors have been exploiting recently disclosed vulnerabilities affecting enterprise VPN products from Fortinet, Palo Alto Networks and Pulse Secure, the UK’s National Cyber Security Centre (NCSC) warns.

The NCSC, which is part of the UK’s GCHQ intelligence agency, issued an alert this week to warn organizations that they may be targeted if they use the affected products.

“This activity is ongoing, targeting both UK and international organisations. Affected sectors include government, military, academic, business and healthcare,” the NCSC said.

According to the organization, APTs have been targeting several vulnerabilities, including CVE-2019-11510 and CVE-2019-11539, which affect Pulse Secure products, CVE-2018-13379,

CVE-2018-13382 and CVE-2018-13383, which affect Fortinet products, and CVE-2019-1579, which impacts Palo Alto Networks products.

These and other vulnerabilities in Pulse Secure, Fortinet and Palo Alto Networks VPNs were disclosed this summer by Orange Tsai and Meh Chang of the research team at security consulting firm DEVCORE. Shortly after their disclosure, which included technical details, several proof-of-concept (PoC) exploits were made public.

The flaws can be exploited remotely to infiltrate corporate networks, eavesdrop on communications, and steal potentially sensitive information, the researchers warned.

A few weeks after disclosure, the first attack attempts targeting Fortinet and Pulse Secure systems were spotted.

Analysts from Microsoft’s Threat Intelligence Center revealed in early September that a threat group tracked by the company as MANGANESE had been using the vulnerabilities in its attacks since mid-July, weeks before PoC exploits were made public.

MANGANESE, which FireEye tracks as APT5, has been active since at least 2007, mainly targeting telecommunications and technology companies in Asia.

The NCSC’s alert does not specify which APTs have been targeting the vulnerabilities, but it advises organizations previously targeted by APTs and organizations that have detected successful exploitation against their VPN to take measures.

Pulse Secure claimed in late August that a majority of its customers had already patched the vulnerabilities, but Bad Packets stated at the time that there had been over 14,000 vulnerable Pulse Secure endpoints hosted by over 2,500 organizations.

A recent update provided by Bad Packets, which has been working with government agencies in an effort to get organizations to deploy the patches, showed that there had still been over 6,500 vulnerable Pulse Secure endpoints as of September 30. A majority are located in the United States, Japan and the UK.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.