<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FortiOS &amp;amp; FortiProxy - Authentication bypass in Node.js websocket module vulnerability in Threats</title>
    <link>https://community.isc2.org/t5/Threats/FortiOS-amp-FortiProxy-Authentication-bypass-in-Node-js/m-p/78404#M1565</link>
    <description>Stay safe online, everyone! Fortinet's recent announcement about a critical vulnerability in FortiOS and FortiProxy is serious. Think of your network security like managing your own little store, but instead of bananas in Monkey Mart, it's sensitive data! Unpatched systems could grant attackers "super-admin" access, like giving them the keys to the whole kingdom. Be sure to check for those IOCs and apply the necessary updates immediately to avoid potential compromises.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Tue, 01 Apr 2025 03:29:55 GMT</pubDate>
    <dc:creator>Danielll</dc:creator>
    <dc:date>2025-04-01T03:29:55Z</dc:date>
    <item>
      <title>FortiOS &amp; FortiProxy - Authentication bypass in Node.js websocket module vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/FortiOS-amp-FortiProxy-Authentication-bypass-in-Node-js/m-p/76318#M1455</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fortinet has identified a critical vulnerability in FortiOS and FortiProxy. The vulnerability may allow an unauthenticated remote attacker to gain “super-admin” privileges.&lt;BR /&gt;&lt;BR /&gt;The Fortinet vulnerability notification describes possible Indicators of Compromise (IOCs) and IPs associated the threat actor, which may assist in identifying suspicious activity.&lt;BR /&gt;&lt;BR /&gt;Fortinet has observed active exploitation of this vulnerability.&lt;BR /&gt;Fortinet advises that threat actors have been observed performing the following post exploitation activities:&lt;BR /&gt;Creating an admin account on the device with a random user name.&lt;BR /&gt;Creating a Local User account on the device using a random name.&lt;BR /&gt;Creating a user group or adding the above local user to an existing sslvpn user group.&lt;BR /&gt;Adding/changing other settings (firewall policy etc.)&lt;BR /&gt;Logging in the sslvpn with the above-added local users to get a tunnel to the internal network.&lt;BR /&gt;&lt;BR /&gt;Affected versions/applications:&lt;BR /&gt;&lt;BR /&gt;FortiOS version 7.0 - 7.0.0 through 7.0.16&lt;BR /&gt;FortiProxy version 7.0 - 7.0.0 through 7.0.19&lt;BR /&gt;FortiProxy version 7.2 - 7.2.0 through 7.2.12&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/fortios-fortiproxy-authentication-bypass-nodejs-websocket-module-vulnerability?utm_source=linkedin&amp;amp;utm_campaign=feb-25&amp;amp;utm_medium=social&amp;amp;utm_content=alert-fortinet" target="_blank"&gt;https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/fortios-fortiproxy-authentication-bypass-nodejs-websocket-module-vulnerability?utm_source=linkedin&amp;amp;utm_campaign=feb-25&amp;amp;utm_medium=social&amp;amp;utm_content=alert-fortinet&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.fortiguard.com/psirt/FG-IR-24-535" target="_blank"&gt;https://www.fortiguard.com/psirt/FG-IR-24-535&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 06:21:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/FortiOS-amp-FortiProxy-Authentication-bypass-in-Node-js/m-p/76318#M1455</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2025-01-15T06:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: FortiOS &amp; FortiProxy - Authentication bypass in Node.js websocket module vulnerability</title>
      <link>https://community.isc2.org/t5/Threats/FortiOS-amp-FortiProxy-Authentication-bypass-in-Node-js/m-p/78404#M1565</link>
      <description>Stay safe online, everyone! Fortinet's recent announcement about a critical vulnerability in FortiOS and FortiProxy is serious. Think of your network security like managing your own little store, but instead of bananas in Monkey Mart, it's sensitive data! Unpatched systems could grant attackers "super-admin" access, like giving them the keys to the whole kingdom. Be sure to check for those IOCs and apply the necessary updates immediately to avoid potential compromises.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Apr 2025 03:29:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/FortiOS-amp-FortiProxy-Authentication-bypass-in-Node-js/m-p/78404#M1565</guid>
      <dc:creator>Danielll</dc:creator>
      <dc:date>2025-04-01T03:29:55Z</dc:date>
    </item>
  </channel>
</rss>

