Fortinet has publicly disclosed a critical zero-day vulnerability in its FortiManager software, identified as CVE-2024-47575. The vulnerability has been actively exploited in the wild.
Due to a missing authentication for a critical function in the FortiManager fgfmd daemon, this vulnerability allows remote unauthenticated attackers to execute arbitrary code or commands through specially crafted requests.
The flaw carries a CVSS v3 score of 9.8, highlighting its severity and potential impact on affected systems.
Reports indicate that the vulnerability has been exploited to automate the exfiltration of sensitive files from FortiManager, including IP addresses, credentials, and managed device configurations.
Mandiant has identified a new threat cluster, UNC5820, exploiting a critical vulnerability in Fortinet’s FortiManager, tracked as CVE-2024-47575.
This vulnerability first observed being exploited on June 27, 2024, allows attackers to exfiltrate sensitive configuration data from FortiGate devices managed by compromised FortiManager systems.
Free Webinar on Protecting Websites & APIs From Cyber Attacks -> Join Here
UNC5820 has been observed staging and exfiltrating configuration data, including detailed information about managed appliances and users’ FortiOS256-hashed passwords.
This data could potentially be used to compromise FortiManager systems further and move laterally across enterprise environments.
The vulnerability affects multiple versions of FortiManager and FortiManager Cloud:
Fortinet has released patches for these versions and urges users to upgrade to secure versions immediately.
Additionally, workarounds are available for certain versions, including preventing unknown devices from registering and using custom certificates for authentication.
Fortinet recommends taking immediate action to secure affected systems:
This zero-day vulnerability underscores the importance of timely patching and vigilant monitoring of network management tools like FortiManager, which are critical components in many organizational IT infrastructures.
Organizations using FortiManager should act swiftly to mitigate the risks associated with this flaw and ensure their networks remain secure against potential exploits.
Fortinet has provided several indicators of compromise (IoCs) to help organizations detect if their FortiManager systems have been breached:
/tmp/.tm
and /var/tmp/.tm
directories.Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Watch Here
A severe vulnerability in the Linux kernel's ksmbd SMB server implementation has been disclosed, potentially…
A sophisticated cybercriminal campaign has emerged targeting Indonesian and Vietnamese Android users with banking trojans…
A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening…
Phishing campaigns are getting harder to spot, sometimes hiding in files you’d never suspect. ANY.RUN’s…
Cisco has disclosed a zero-day vulnerability, CVE-2025-20352, in its widely used IOS and IOS XE…
Three sophisticated malware families have emerged as significant threats to telecommunications and manufacturing sectors across…