Scans for old Fortigate Vulnerability: Building Target Lists?
This last few days, I saw a few requests associated with an older Fortigate vulnerability hitting our honeypots:
GET /remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession HTTP/1.1
These requests attempt to exploit CVE-2018-13379, an older vulnerability, as indicated by the CVE number. One concern was if these scans are related to the new issue Fortigate patched last week, CVE-2022-40684 is an authentication bypass vulnerability that was patched last week and is already being exploited, according to Fortigate. However, the scan above is looking for the SSL VPN console, which is not affected by the new vulnerability.
Still: Make sure that your FortiGate devices are up to date. These scans may still be helpful to fingerprint devices and to build a target list. These targets could later be exploited after an exploit is released. The Horizon 3 Attack Team promised to release a PoC exploit this week.
The scans originate from 152.89.196.23, an IP with a history of scans for web vulnerabilities.
---
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|
Application Security: Securing Web Apps, APIs, and Microservices | Online | US Eastern | Jan 27th - Feb 1st 2025 |
Comments
Anonymous
Oct 17th 2022
2 years ago