Fortinet FortiManager flaw exploited in zero-day attacks (CVE-2024-47575)

Share:

Fortinet has finally made public information about CVE-2024-47575, a critical FortiManager vulnerability that attackers have exploited as a zero-day.

About CVE-2024-47575

CVE-2024-47575 is a vulnerability stemming from missing authentication for a critical function in FortiManager’s fgfmd daemon. Remote, unauthenticated attackers could exploit the flaw to execute arbitrary code or commands via specially crafted requests.

It affects various versions of FortiManager and FortiManager Cloud, as well as some older FortiAnalyzer models.

“Reports have shown this vulnerability to be exploited in the wild,” Fortinet’s advisory states.

“The identified actions of this attack in the wild have been to automate via a script the exfiltration of various files from the FortiManager which contained the IPs, credentials and configurations of the managed devices. At this stage, we have not received reports of any low-level system installations of malware or backdoors on these compromised FortiManager systems. To the best of our knowledge, there have been no indicators of modified databases, or connections and modifications to the managed devices.”

The advisory recommends upgrading to fixed versions, outlines possible workarounds, and provides known indicators of compromise (IoCs).

Imperfect disclosure

Roughly ten days ago, Fortinet shared details about the flaw and mitigation advice with a subset of customers. The private notification wasn’t meant to be shared outside of recipients’ organization.

But the vulnerability was already being exploited, and news travels quickly in cybersecurity circles. Respected independent security researcher Kevin Beaumont, who wasn’t among the people who received Fortinet’s notification, started piecing together information and sharing it online.

“The threat actor has been combo’ing the other CISA KEV vuln (from earlier in the year) to enter FortiGate, then used this to enter the managing FortiManager, and then using that to go back downstream – i.e. jumping over zoned networks,” he summed up the in-the-wild attacks.

Caitlin Condon, vulnerability research director at Rapid7, has confirmed that their customers “have also reported receiving communications from service providers indicating the vulnerability may have been exploited in their environments.”

Fortinet told Help Net Security they’ve promptly communicated critical information and resources to customers after identifying the vulnerability.

“This is in line with our processes and best practices for responsible disclosure to enable customers to strengthen their security posture prior to an advisory being publicly released to a broader audience, including threat actors. We urge customers to follow the guidance provided to implement the workarounds and fixes and to continue tracking our advisory page for updates. We continue to coordinate with the appropriate international government agencies and industry threat organizations as part of our ongoing response.”

UPDATE (October 24, 2024, 11:00 a.m. ET):

“In October 2024, Mandiant collaborated with Fortinet to investigate the mass exploitation of FortiManager appliances across 50+ potentially compromised FortiManager devices in various industries,” Mandiant’s analysts shared on Thursday.

They say that a new threat cluster – tracked as UNC5820 – has been exploiting the FortiManager vulnerability as early as June 27, 2024.

“UNC5820 staged and exfiltrated the configuration data of the FortiGate devices managed by the exploited FortiManager. This data contains detailed configuration information of the managed appliances as well as the users and their FortiOS256-hashed passwords.”

This data could be used to further compromise the FortiManager, move laterally to the managed Fortinet devices, and target the enterprise environment, they said, but noted that they found no evidence that the threat actors actually used the data to achieve that.

Zeljka Zorz

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
6:05 am, Jun 30, 2025
weather icon 18°C
L: 17° | H: 19°
broken clouds
Humidity: 83 %
Pressure: 1020 mb
Wind: 10 mph E
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 66%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:46 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
17° | 19°°C 0 mm 0% 9 mph 83 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
22° | 33°°C 0 mm 0% 10 mph 68 % 1016 mb 0 mm/h
Wed Jul 02 10:00 pm
weather icon
16° | 23°°C 0.65 mm 65% 10 mph 82 % 1021 mb 0 mm/h
Thu Jul 03 10:00 pm
weather icon
14° | 24°°C 0 mm 0% 10 mph 84 % 1026 mb 0 mm/h
Fri Jul 04 10:00 pm
weather icon
15° | 25°°C 0 mm 0% 13 mph 57 % 1027 mb 0 mm/h
Today 7:00 am
weather icon
18° | 19°°C 0 mm 0% 4 mph 83 % 1020 mb 0 mm/h
Today 10:00 am
weather icon
21° | 25°°C 0 mm 0% 6 mph 74 % 1020 mb 0 mm/h
Today 1:00 pm
weather icon
26° | 30°°C 0 mm 0% 7 mph 49 % 1018 mb 0 mm/h
Today 4:00 pm
weather icon
30° | 30°°C 0 mm 0% 9 mph 26 % 1015 mb 0 mm/h
Today 7:00 pm
weather icon
29° | 29°°C 0 mm 0% 9 mph 31 % 1014 mb 0 mm/h
Today 10:00 pm
weather icon
27° | 27°°C 0 mm 0% 2 mph 42 % 1014 mb 0 mm/h
Tomorrow 1:00 am
weather icon
24° | 24°°C 0 mm 0% 4 mph 56 % 1015 mb 0 mm/h
Tomorrow 4:00 am
weather icon
22° | 22°°C 0 mm 0% 4 mph 68 % 1015 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€92,438.72
1.03%
Ethereum(ETH)
€2,130.50
2.80%
Tether(USDT)
€0.85
-0.01%
XRP(XRP)
€1.87
0.33%
Solana(SOL)
€129.06
1.02%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.142414
2.46%
Shiba Inu(SHIB)
€0.000010
0.42%
Pepe(PEPE)
€0.000009
5.52%
Scroll to Top