{"id":16929,"date":"2020-12-01T00:01:00","date_gmt":"2020-11-30T23:01:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=16929"},"modified":"2022-11-04T11:49:13","modified_gmt":"2022-11-04T10:49:13","slug":"us-cert-warnung-fortinet-ssl-vpns-absichern-passwrter-ndern","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/12\/01\/us-cert-warnung-fortinet-ssl-vpns-absichern-passwrter-ndern\/","title":{"rendered":"US-CERT warning: Secure Fortinet SSL VPNs, change passwords"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/11\/30\/us-cert-warnung-fortinet-ssl-vpns-absichern-passwrter-ndern\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]The Cybersecurity and Infrastructure Security Agency (CISA) has raised the alarm about a Fortinet FortiOS vulnerability. The Fortinet products with unpatched Fortinet FortiOS are under targeted attack. And Darknet has a list of credentials for such systems in circulation. Although there are patches for FortOS since May 2019, I have also found vulnerable devices in Germany in a leaked IP list.<\/p>\n<p><!--more--><\/p>\n<h2>The US-CERT warning<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/6f97dc7074024b79bfc02453b0af2269\" width=\"1\" height=\"1\">US-CERT has warned on <a href=\"https:\/\/twitter.com\/USCERT_gov\/status\/1332357512994172929\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a> about a vulnerability in Fortinet products. US-CERT is urging people to immediately update Fortinet products to close a critical security vulnerability. <\/p>\n<p><a href=\"https:\/\/twitter.com\/USCERT_gov\/status\/1332357512994172929\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" title=\"US-CERT-Warnung\" alt=\"US-CERT-Warnung\" src=\"https:\/\/i.imgur.com\/DA6zU0c.png\"><\/a><\/p>\n<p>Here is the relevant text.<\/p>\n<blockquote>\n<p>Fortinet FortiOS System File Leak<\/p>\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) is aware of the possible exposure of passwords on Fortinet devices that are vulnerable to CVE 2018-13379. Exploitation of this vulnerability may allow an unauthenticated attacker to access FortiOS system files. Potentially affected devices may be located in the United States.<\/p>\n<\/blockquote>\n<p>Furthermore, users are urged to update Fortinet devices immediately, as updates have been available for a long time (see following text). The authority links to a <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-18-384\" target=\"_blank\" rel=\"noopener noreferrer\">security advisory from Fortinet<\/a>. I have extracted the required information about the CVE-2018-13379 vulnerability below.&nbsp; <\/p>\n<h2>Hackers sell access data<\/h2>\n<p>The term 'knowledge of possible password disclosure on Fortinet devices' is due to the fact that hackers on the Internet have not only published IP lists of vulnerable systems (see my blog post <a href=\"https:\/\/borncity.com\/win\/2020\/11\/23\/ip-addresses-published-for-over-49000-exploitable-fortinet-ssl-vpns\/\">IP addresses published for over 49,000 exploitable Fortinet SSL VPNs<\/a>). I randomly checked the IPs on the list and found devices in Belgium, France, Sweden, Turkey and many in the USA, but also locations in Germany. If you have Fortinet devices in use, you can see if their IP addresses appear in the respective file. <\/p>\n<p>But that's not all, because shortly after the leak with the list of IP addresses, a list of access data (user names, passwords, unmasked IP addresses) appeared in an underground forum.<\/p>\n<p><a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1332409536041381890\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" title=\" Fortinet-Zugangsdaten\" alt=\" Fortinet-Zugangsdaten\" src=\"https:\/\/i.imgur.com\/QFFweW7.png\"><\/a><\/p>\n<p>The colleagues from Bleeping Computer had disclosed this in <a href=\"https:\/\/web.archive.org\/web\/20220609233558\/https:\/\/www.bleepingcomputer.com\/news\/security\/passwords-exposed-for-almost-50-000-vulnerable-fortinet-vpns\/\" target=\"_blank\" rel=\"noopener noreferrer\">an article last week<\/a> and point it out in the <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1332409536041381890\" target=\"_blank\" rel=\"noopener noreferrer\">above tweet<\/a>. So patching Fortinet devices is no longer enough. Subsequently, the access data should be changed. Administrators should also check whether the devices are already equipped with a backdoor. Bad Packets points this out in the following <a href=\"https:\/\/twitter.com\/bad_packets\/status\/1332419075088084992\" target=\"_blank\" rel=\"noopener noreferrer\">tweet<\/a>.<\/p>\n<p><img decoding=\"async\" title=\"CVE-2018-13379 Warning\" alt=\"CVE-2018-13379 Warning\" src=\"https:\/\/i.imgur.com\/K48K99G.png\"><\/p>\n<h2>The vulnerability CVE-2018-13379 <\/h2>\n<p>Unpatched Fortinet VPN devices are vulnerable to single-line exploits via a vulnerability that has been in place since 2018. The exploits target the path traversal vulnerability <a href=\"https:\/\/web.archive.org\/web\/20210604005229\/https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-13379\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-13379<\/a>, which has an NVD score of 9.8 (out of 10). The (\"Path Traversal\" vulnerability occurs due to improper restriction of a path name to a directory in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7, and 5.4.6 to 5.4.12. It allows an unauthenticated attacker to download system files via specially crafted HTTP resource requests through the SSL VPN web portal. PacketStorm-Security has written something about it <a href=\"https:\/\/packetstormsecurity.com\/files\/154146\/FortiOS-5.6.7-6.0.4-Credential-Disclosure.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. At the beginning of May 2019 Fortinet has published a <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-18-384\">PSIRT Advisory<\/a> and released updates for the affected FortOS versions. So the vulnerability could have been patched long ago. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The Cybersecurity and Infrastructure Security Agency (CISA) has raised the alarm about a Fortinet FortiOS vulnerability. The Fortinet products with unpatched Fortinet FortiOS are under targeted attack. And Darknet has a list of credentials for such systems in circulation. Although &hellip; <a href=\"https:\/\/borncity.com\/win\/2020\/12\/01\/us-cert-warnung-fortinet-ssl-vpns-absichern-passwrter-ndern\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-16929","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=16929"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16929\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=16929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=16929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=16929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}