A threat actor has leaked online access credentials for 87,000 Fortinet VPN devices that were apparently compromised using a vulnerability identified and patched two years ago.
Approximately 500,000 credentials for FortiGate SSL-VPN devices were leaked online last week, essentially providing anyone with access to devices at organizations in 74 countries around the world.
A total of 22,500 entities are believed to be affected, with nearly 3,000 of them located in the United States. Others are located in France, India, Italy, Israel, and Taiwan.
The credentials, according to Fortinet, were stolen from devices still vulnerable to CVE-2018-13379, a path traversal vulnerability in the FortiOS SSL VPN web portal, which is known to have been exploited in live attacks.
An unauthenticated attacker could use special crafted HTTP requests to exploit the security hole and download system files from the SSL VPN web portal. The login credentials are located in the FortiOS system files.
Fortinet also warned that devices that received the patch for CVE-2018-13379 may continue to be vulnerable if the compromised password isn’t changed after the patch is fully deployed.
[ READ: Hackers Target Vulnerabilities in Fortinet, Pulse Secure Products ]
“Fortinet is reiterating that, if at any time your organization was running any of the affected versions listed below, even if you have upgraded your devices, you must also perform the recommended user password reset following upgrade, as per the customer support bulletin and other advisory information. Otherwise, you may remain vulnerable post-upgrade if your users’ credentials were previously compromised,” the company said.
The leaked credentials were posted online by a member of the Groove ransomware operation, according to threat hunters tracking ransomware campaigns.
Owners of FortiGate SSL-VPN devices are advised to update to FortiOS 5.4.13, 5.6.14, 6.0.11, or 6.2.8 and above, and to reset the passwords for their devices after the update.
Related: Cring Ransomware Targets Industrial Organizations
Related: Ransomware Gang Leaks Files Allegedly Stolen From Accenture

More from Ionut Arghire
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- Chrome 111 Update Patches High-Severity Vulnerabilities
- BreachForums Shut Down Over Law Enforcement Takeover Concerns
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
Latest News
- Backslash Snags $8M Seed Financing for AppSec Tech
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- Chrome 111 Update Patches High-Severity Vulnerabilities
- BreachForums Shut Down Over Law Enforcement Takeover Concerns
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Malware Trends: What’s Old Is Still New
- Burnout in Cybersecurity – Can It Be Prevented?
