Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Tens of Thousands of Unpatched Fortinet VPNs Hacked via Old Security Flaw

A threat actor has leaked online access credentials for 87,000 Fortinet VPN devices that were apparently compromised using a vulnerability identified and patched two years ago.

A threat actor has leaked online access credentials for 87,000 Fortinet VPN devices that were apparently compromised using a vulnerability identified and patched two years ago.

Approximately 500,000 credentials for FortiGate SSL-VPN devices were leaked online last week, essentially providing anyone with access to devices at organizations in 74 countries around the world.

A total of 22,500 entities are believed to be affected, with nearly 3,000 of them located in the United States. Others are located in France, India, Italy, Israel, and Taiwan.

The credentials, according to Fortinet, were stolen from devices still vulnerable to CVE-2018-13379, a path traversal vulnerability in the FortiOS SSL VPN web portal, which is known to have been exploited in live attacks

An unauthenticated attacker could use special crafted HTTP requests to exploit the security hole and download system files from the SSL VPN web portal. The login credentials are located in the FortiOS system files.

Fortinet also warned that devices that received the patch for CVE-2018-13379 may continue to be vulnerable if the compromised password isn’t changed after the patch is fully deployed.

 [ READ: Hackers Target Vulnerabilities in Fortinet, Pulse Secure Products ]

“Fortinet is reiterating that, if at any time your organization was running any of the affected versions listed below, even if you have upgraded your devices, you must also perform the recommended user password reset following upgrade, as per the customer support bulletin and other advisory information. Otherwise, you may remain vulnerable post-upgrade if your users’ credentials were previously compromised,” the company said.

Advertisement. Scroll to continue reading.

The leaked credentials were posted online by a member of the Groove ransomware operation, according to threat hunters tracking ransomware campaigns. 

Owners of FortiGate SSL-VPN devices are advised to update to FortiOS 5.4.13, 5.6.14, 6.0.11, or 6.2.8 and above, and to reset the passwords for their devices after the update.

Related: Cring Ransomware Targets Industrial Organizations

Related: Ransomware Gang Leaks Files Allegedly Stolen From Accenture

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Checkmarx has appointed Scott Gainey as Chief Marketing Officer.

Jason Hogg has been named Executive Chairman of CYPFER.

HUB Cyber Security has appointed former PayPal and American Express executive Paul Parisi as its Global Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.