Security News > 2020 > September > Fortinet VPN with Default Settings Leave 200,000 Businesses Open to Hackers
Now according to network security platform provider SAM Seamless Network, over 200,000 businesses that have deployed the Fortigate VPN solution-with default configuration-to enable employees to connect remotely are vulnerable to man-in-the-middle attacks, allowing attackers to present a valid SSL certificate and fraudulently take over a connection.
The main reason for this is that the bundled default SSL certificate uses the router's serial number as the server name for the certificate.
For its part, Fortinet said it has no plans to address the issue, suggesting that users can manually replace the default certificate and ensure the connections are safe from MitM attacks.
Currently, Fortinet provides a warning when using the default certificate: "You are using a default built-in certificate, which will not be able to verify your server's domain name. It is recommended to purchase a certificate for your domain and upload it for use."
"Each VPN appliance and the set up process provides multiple clear warnings in the GUI with documentation offering guidance on certificate authentication and sample certificate authentication and configuration examples. Fortinet strongly recommends adhering to its provided installation documentation and process, paying close attention to warnings throughout that process to avoid exposing the organization to risk."
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/olEmYxK4s00/fortigate-vpn-security.html
Related news
- Chinese hackers exploit Fortinet VPN zero-day to steal credentials (source)
- Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost (source)
- Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials (source)
- China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer (source)
- Fortinet VPN design flaw hides successful brute-force attacks (source)