Aggregator
读贝索斯致股东信,Day 1 秘籍保持活力
CVE-2024-9865 | EventPrime Plugin up to 4.0.4.7 on WordPress Transaction Log cross site scripting
CVE-2024-8717 | PDF Flipbook, 3D Flipbook, PDF Embed, PDF Viewer Plugin cross site scripting
CVE-2024-9943 | MultiVendorX Plugin up to 4.2.4 on WordPress cross-site request forgery
CVE-2024-9531 | MultiVendorX Plugin up to 4.2.4 on WordPress authorization
CVE-2024-10050 | Elementor Header & Footer Builder Plugin up to 1.6.43 on WordPress Shortcode information disclosure
CVE-2024-8667 | HurryTimer Plugin up to 2.10.0 on WordPress authorization
BianLian
CVE-2024-40432 | Realtek SD Card Reader Driver prior 10.0.26100.21374 denial of service
CVE-2024-48964 | Snyk Gradle Plugin prior 1.1294.0 Gradle Project Scanning os command injection
CVE-2024-40431 | Realtek SD Card Reader Driver prior 10.0.26100.21374 Kernel Memory memory corruption
CVE-2024-48213 | Xinhu RockOA 2.6.5 beifenAction.php path traversal
CVE-2024-48963 | Snyk Cli 1.996.0 PHP Project Scanning os command injection
RansomHub
垃圾洞,在SRC捡了1w赏金。
Introducing Access for Infrastructure: SSH
Lazarus Group Exploits Chrome Zero-Day in Latest Campaign
Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security
At long last, there’s a spotlight — Application Detection and Response (ADR) — that shines the light into what’s been a blindspot: namely, the application layer.
The post Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security appeared first on Security Boulevard.
CVE-2024-47575: Frequently Asked Questions About FortiJump Zero-Day in FortiManager and FortiManager Cloud
Frequently asked questions about a zero-day vulnerability in Fortinet’s FortiManager that has reportedly been exploited in the wild.
BackgroundThe Tenable Security Response Team (SRT) has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a zero-day vulnerability in Fortinet’s FortiManager.
Update October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.
FAQWhat is FortiJump?
FortiJump is a name given to a zero-day vulnerability in the FortiGate-FortiManager (FGFM) protocol in Fortinet’s FortiManager and FortiManager Cloud. It was named by security researcher Kevin Beaumont in a blog post on October 22. Beaumont also created a logo for FortiJump.
What are the vulnerabilities associated with FortiJump?
On October 23, Fortinet published an advisory (FG-IR-24-423) for FortiJump, assigning a CVE identifier for the flaw.
CVEDescriptionCVSSv3CVE-2024-47575FortiManager Missing authentication in fgfmsd Vulnerability9.8What is CVE-2024-47575?
CVE-2024-47575 is a missing authentication vulnerability in the FortiGate to FortiManager (FGFM) daemon (fgfmsd) in FortiManager and FortiManager Cloud.
How severe is CVE-2024-47575?
Exploitation of FortiJump could allow an unauthenticated, remote attacker using a valid FortiGate certificate to register unauthorized devices in FortiManager. Successful exploitation would grant the attacker the ability to view and modify files, such as configuration files, to obtain sensitive information, as well as the ability to manage other devices.
Obtaining a certificate from a FortiGate device is relatively easy:
Comment
by from discussion
infortinet
According to results from Shodan, there are nearly 60,000 FortiManager devices that are internet-facing, including over 13,000 in the United States, over 5,800 in China, nearly 3,000 in Brazil and 2,300 in India:
When was FortiJump first disclosed?
There were reports on Reddit that Fortinet proactively notified customers using FortiManager about the flaw ahead of the release of patches, though some customers say they never received any notifications. Beaumont posted a warning to Mastodon on October 13:
Post by @[email protected]View on Mastodon
Was this exploited as a zero-day?
Yes, according to both Beaumont and Fortinet, FortiJump has been exploited in the wild as a zero-day. Additionally, Google Mandiant published a blog post on October 23 highlighting its collaborative investigation with Fortinet into the “mass exploitation” of this zero-day vulnerability. According to Google Mandiant, they’ve discovered over 50 plus “potentially compromised FortiManager devices in various industries.”
Which threat actors are exploiting FortiJump?
Google Mandiant attributed exploitation activity to a new threat cluster called UNC5820, adding that the cluster has been observed exploiting the flaw since “as early as June 27, 2024.”
Is there a proof-of-concept (PoC) available for this vulnerability/these vulnerabilities?
As of October 23, there are no public proof-of-concept exploits available for FortiJump.
Are patches or mitigations available for FortiJump?
The following table contains a list of affected products, versions and fixed versions.
Affected ProductAffected VersionsFixed VersionFortiManager 6.26.2.0 through 6.2.12Upgrade to 6.2.13 or aboveFortiManager 6.46.4.0 through 6.4.14Upgrade to 6.4.15 or aboveFortiManager 7.07.0.0 through 7.0.12Upgrade to 7.0.13 or aboveFortiManager 7.27.2.0 through 7.2.7Upgrade to 7.2.8 or aboveFortiManager 7.47.4.0 through 7.4.4Upgrade to 7.4.5 or aboveFortiManager 7.67.6.0Upgrade to 7.6.1 or aboveFortiManager Cloud 6.46.4 all versionsMigrate to a fixed releaseFortiManager Cloud 7.07.0.1 through 7.0.12Upgrade to 7.0.13 or aboveFortiManager Cloud 7.27.2.1 through 7.2.7Upgrade to 7.2.8 or aboveFortiManager Cloud 7.47.4.1 through 7.4.4Upgrade to 7.4.5 or aboveFortiManager Cloud 7.6Not affectedNot ApplicableFortinet’s advisory provides workarounds for specific impacted versions if patching is not feasible. These include blocking unknown devices from attempting to register to FortiManager, creating IP allow lists of approved FortiGate devices that can connect to FortiManager and the creation of custom certificates. Generally speaking, it is advised to ensure FGFM is not internet-facing.
Has Tenable released any product coverage for these vulnerabilities?
A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2024-47575 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.
Get more information- Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs
- FortiGuard Labs PSIRT FG-IR-24-423 Advisory
Update October 23: The blog has been updated with new information about in-the-wild exploitation and threat actor activity associated with this vulnerability.
Join Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.