{"id":28001,"date":"2022-12-13T01:34:48","date_gmt":"2022-12-13T00:34:48","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=28001"},"modified":"2022-12-13T01:34:48","modified_gmt":"2022-12-13T00:34:48","slug":"fortiguard-labs-reports-critical-vulnerability-cve-2022-42475-in-fortios-is-exploited","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/12\/13\/fortiguard-labs-reports-critical-vulnerability-cve-2022-42475-in-fortios-is-exploited\/","title":{"rendered":"FortiGuard Labs reports: Critical vulnerability CVE-2022-42475 in FortiOS is exploited"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/12\/13\/fortiguard-labs-meldet-kritische-sicherheitslcke-in-fortios-wird-ausgenutzt\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]FortiGuard Labs reported a critical vulnerability CVE-2022-42475 in FortiOS on December 12, 2022, which arguably allows remote code execution over SSL VPN. The bad thing is that this vulnerability is already being exploited in the wild. The vendor has since released FortiOS security updates for the affected versions.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/ab730623deb24fa39102f6f097ebca49\" alt=\"\" width=\"1\" height=\"1\" \/>I have been alerted to this issue by two blog readers (thanks for that), which has been documented by FortiGuard Labs in PSIRT Advisory <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-22-398\" target=\"_blank\" rel=\"noopener\">FG-IR-22-398<\/a>. There is a heap-based buffer overflow vulnerability CVE-2022-42475 in FortiOS SSL VPN. Through this vulnerability, unauthenticated attackers could execute arbitrary code or commands via specially crafted requests. The CVE-2022-42475 vulnerability has been assigned a CVE value of 9.3. The following Fortinet products are affected:<\/p>\n<p>FortiOS Version 7.2.0 to 7.2.2<br \/>\nFortiOS version 7.0.0 to 7.0.8<br \/>\nFortiOS versions 6.4.0 to 6.4.10<br \/>\nFortiOS versions 6.2.0 to 6.2.11<br \/>\nFortiOS-6K7K version 7.0.0 to 7.0.7<br \/>\nFortiOS-6K7K version 6.4.0 to 6.4.9<br \/>\nFortiOS-6K7K version 6.2.0 to 6.2.11<br \/>\nFortiOS-6K7K version 6.0.0 to 6.0.14<\/p>\n<p>Fortinet states that there is already one known case of this vulnerability being exploited in the wild. The vendor recommends immediately scanning systems for the following indicators of compromise:<\/p>\n<blockquote><p>Multiple log entries with:<\/p>\n<p>Logdesc=\"Application crashed\" und msg=\"[&#8230;] application:sslvpnd,[&#8230;], Signal 11 received, Backtrace: [&#8230;]\"<\/p>\n<p>Presence of the following artifacts in the file system:<\/p>\n<p>\/data\/lib\/libips.bak<br \/>\n\/data\/lib\/libgif.so<br \/>\n\/data\/lib\/libiptcp.so<br \/>\n\/data\/lib\/libipudp.so<br \/>\n\/data\/lib\/libjepg.so<br \/>\n\/var\/.sslvpnconfigbk<br \/>\n\/data\/etc\/wxd.conf<br \/>\n\/flash<\/p>\n<p>Connections to suspicious IP addresses from FortiGate:<\/p>\n<p>188.34.130.40:444<br \/>\n103.131.189.143:30080,30081,30443,20443<br \/>\n192.36.119.61:8443,444<br \/>\n172.247.168.153:8033<\/p><\/blockquote>\n<p>If there is evidence of infection, the system must be cleaned (FortiOS clean install). Fortinet recommends updating the affected products to the following software version, depending on the installed FotiOS version, to close the vulnerability.<\/p>\n<p>FortiOS version 7.2.3 or higher<br \/>\nFortiOS version 7.0.9 or higher<br \/>\nFortiOS version 6.4.11 or higher<br \/>\nFortiOS version 6.2.12 or higher<br \/>\nFortiOS-6K7K version 7.0.8 or higher<br \/>\nFortiOS-6K7K version 6.4.10 or higher<br \/>\nFortiOS-6K7K version 6.2.12 or higher<br \/>\nFortiOS-6K7K version 6.0.15 or higher<\/p>\n<p>Security researcher Will Dormann points out in a tweet that CVE-2022-42475 is still marked as \"reserved.\" Some of the FortiOS updates had already been available for a month. For example, FortiOS 6.2.12, released on November 3, 2022, is supposed to close the CVE-2022-42475 vulnerability, according to the list above. however, nothing about a vulnerability has been mentioned in the<a href=\"https:\/\/docs.fortinet.com\/document\/fortigate\/6.2.12\/fortios-release-notes\/289806\/resolved-issues\" target=\"_blank\" rel=\"noopener\"> release notes.<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/i.imgur.com\/gaQCCDP.png\" \/><\/p>\n<p>At the same time, Dormann included a tweet from Joe Roosen, according to which the vulnerability is already being exploited by ransomware groups. It seems that Fortinet is quite late with the warning &#8211; so the fastest possible action is called for.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]FortiGuard Labs reported a critical vulnerability CVE-2022-42475 in FortiOS on December 12, 2022, which arguably allows remote code execution over SSL VPN. The bad thing is that this vulnerability is already being exploited in the wild. The vendor has since &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/12\/13\/fortiguard-labs-reports-critical-vulnerability-cve-2022-42475-in-fortios-is-exploited\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22],"tags":[69],"class_list":["post-28001","post","type-post","status-publish","format-standard","hentry","category-security","category-update","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=28001"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28001\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=28001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=28001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=28001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}