Cyber Security News

FortiManager Devices Mass Compromise Exploiting CVE-2024-47575 Vulnerability

Shadowserver has issued a critical warning about the widespread exploitation of Fortinet FortiManager devices using the recently disclosed CVE-2024-47575 vulnerability.

With a CVSS score of 9.8/10, this critical flaw allows unauthenticated remote attackers to execute arbitrary code or commands on affected systems.

The vulnerability, dubbed “FortiJump,” stems from a missing authentication for a critical function in FortiManager’s fgfmd daemon.

Fortinet confirmed that the flaw has been actively exploited in the wild, with attackers primarily focusing on exfiltrating sensitive data from compromised devices.

Free Webinar on Protecting Websites & APIs From Cyber Attacks -> Join Here

Shadowserver’s Special Report categorizes affected devices into two groups: those confirmed as compromised (tagged as “CVE-2024-47575-compromised”) and those targeted but not confirmed as compromised (tagged as “CVE-2024-47575-targeted”).

Unless extensive forensic analysis proves otherwise, the organization strongly recommends treating all targeted devices as potentially compromised.

The report highlights that compromised devices may have multiple IP addresses or could have traversed NAT devices, complicating the identification process.

Shadowserver emphasizes the urgency of changing credentials, including passwords and user-sensitive data, for all managed devices connected to affected FortiManager systems.

Mandiant has attributed the attacks to a threat actor tracked as UNC5820. Their analysis reveals that the exploitation campaign has been ongoing since at least June 27, 2024, targeting over 50 FortiManager appliances across various industries.

The mass compromise underscores the critical nature of the vulnerability and the rapid exploitation by threat actors.

Organizations using FortiManager are strongly advised to immediately apply the patches provided by Fortinet or implement recommended workarounds if patching is not feasible.

Shadowserver’s Special Report aims to notify potential victims about this significant breach, even if the events occurred outside their usual 24-hour reporting window.

The organization believes that sharing this retrospective data will provide substantial benefits to their constituents, enabling them to take necessary actions to secure their systems.

As the situation continues to evolve, cybersecurity experts urge organizations to remain vigilant, monitor for indicators of compromise, and promptly report any suspicious activities related to their FortiManager deployments.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Watch Here

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts

A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening…

41 minutes ago

Malicious SVGs in Phishing Campaigns: How to Detect Hidden Redirects and Payloads

Phishing campaigns are getting harder to spot, sometimes hiding in files you’d never suspect. ANY.RUN’s…

10 hours ago

Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild

Cisco has disclosed a zero-day vulnerability, CVE-2025-20352, in its widely used IOS and IOS XE…

10 hours ago

RainyDay, Turian and Naikon Malwares Abuse DLL Search Order to Execute Malicious Loaders

Three sophisticated malware families have emerged as significant threats to telecommunications and manufacturing sectors across…

13 hours ago

New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network

In recent months, a sophisticated threat actor leveraging North Korean IT worker employment fraud has…

14 hours ago

Hackers Can Compromise Chromium Browsers in Windows by Loading Arbitrary Extensions

Chromium-based browsers, including Chrome, Edge, and Brave, manage installed extensions via JSON preference files stored under…

15 hours ago