Security News > 2024 > March > Exploit released for Fortinet RCE bug used in attacks, patch now
Security researchers have released a proof-of-concept exploit for a critical vulnerability in Fortinet's FortiClient Enterprise Management Server software, which is now actively exploited in attacks.
On Thursday, one week after Fortinet released security updates to address the security flaw, security researchers with Horizon3's Attack Team published a technical analysis and shared a proof-of-concept exploit that helps confirm if a system is vulnerable without providing remote code execution capabilities.
Those who want to use Horizon3's exploit code in RCE attacks must modify the PoC to use the Microsoft SQL Server xp cmdshell procedure to spawn a Windows command shell for code execution.
In February, Fortinet patched another critical RCE bug in the FortiOS operating system and FortiProxy secure web proxy, saying it was "Potentially being exploited in the wild."
It's also worth noting that Fortinet security vulnerabilities are frequently used to gain unauthorized access to corporate networks for ransomware attacks and cyber espionage campaigns, often using zero-day exploits.
News URL
Related news
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- New Cleo zero-day RCE flaw exploited in data theft attacks (source)
- Fortinet Warns of Critical FortiWLM Flaw That Could Lead to Admin Access Exploits (source)
- Apache Tomcat Vulnerability CVE-2024-56337 Exposes Servers to RCE Attacks (source)
- FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks (source)
- Malware botnets exploit outdated D-Link routers in recent attacks (source)
- New DoubleClickjacking attack exploits double-clicks to hijack accounts (source)
- Mirai Botnet Variant Exploits Four-Faith Router Vulnerability for DDoS Attacks (source)
- Mitel 0-day, 5-year-old Oracle RCE bug under active exploit (source)
- New Web3 attack exploits transaction simulations to steal crypto (source)