Fortinet has released security advisory FG-IR-22-398, warning that the heap-based buffer overflow vulnerability in its FortiOS SSL-VPN has been actively exploited in attacks. The company recommends that all users update to the following versions to fix the bug: FortiOS 6.4.3 to 188.8.131.52, 6.2.6 to 184.108.40.206, and 5.6.12 to 220.127.116.11.
Additionally, Fortinet has provided indicators of compromise (IOCs) for this vulnerability. If your firewall has been exploited, you may see the following entries in the logs:
Logdesc=”Application crashed” and msg=”[…] application:sslvpnd,[…], Signal 11 received, Backtrace: […]”
On the file system of exploited devices, you may also see the following artifacts:
Fortinet has also shared a list of IP addresses that have been seen exploiting this vulnerability, including:
If you have any of these IP addresses in your logs or see any of the listed file system artifacts on your devices, it is important to update your firewall and take other necessary steps to secure your network. ThreatHunter.AI is here to help if you need assistance. Our team of security experts can assist you with updating your firewall and help you identify and mitigate any potential breaches.