Security News > 2024 > March > Exploit released for Fortinet RCE bug used in attacks, patch now
Security researchers have released a proof-of-concept exploit for a critical vulnerability in Fortinet's FortiClient Enterprise Management Server software, which is now actively exploited in attacks.
On Thursday, one week after Fortinet released security updates to address the security flaw, security researchers with Horizon3's Attack Team published a technical analysis and shared a proof-of-concept exploit that helps confirm if a system is vulnerable without providing remote code execution capabilities.
Those who want to use Horizon3's exploit code in RCE attacks must modify the PoC to use the Microsoft SQL Server xp cmdshell procedure to spawn a Windows command shell for code execution.
In February, Fortinet patched another critical RCE bug in the FortiOS operating system and FortiProxy secure web proxy, saying it was "Potentially being exploited in the wild."
It's also worth noting that Fortinet security vulnerabilities are frequently used to gain unauthorized access to corporate networks for ransomware attacks and cyber espionage campaigns, often using zero-day exploits.
News URL
Related news
- Critical Ivanti RCE flaw with public exploit now used in attacks (source)
- CISA says critical Fortinet RCE flaw now exploited in attacks (source)
- Microsoft SharePoint RCE flaw exploits in the wild – you've had 3 months to patch (source)
- Emergency patch: Cisco fixes bug under exploit in brute-force attacks (source)
- 'Patch yesterday': Zimbra mail servers under siege through RCE vuln (source)
- Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit (source)
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- Week in review: Critical Zimbra RCE vulnerability exploited, Patch Tuesday forecast (source)
- Qualcomm Urges OEMs to Patch Critical DSP and WLAN Flaws Amid Active Exploits (source)
- New scanner finds Linux, UNIX servers exposed to CUPS RCE attacks (source)