Mandiant says new Fortinet flaw has been exploited since June

Share:

A new Fortinet FortiManager flaw dubbed “FortiJump” and tracked as CVE-2024-47575 has been exploited since June 2024 in zero-day attacks on over 50 servers, according to a new report by Mandiant.

For the past ten days, rumors of an actively exploited FortiManager zero-day have been circulating online after Fortinet privately notified customers in an advanced notification security advisory.

Today, Fortinet finally disclosed FortiManager vulnerability, stating it was a missing authentication flaw in the Fortinet created the “FortiGate to FortiManager Protocol” (FGFM) API that allowed unauthenticated attackers to execute commands on the server and managed FortiGate devices.

Threat actors could exploit the flaw by utilizing attacker-controlled FortiManager and FortiGate devices with valid certificates to register themselves to any exposed FortiManager server.

Once their device was connected, even if it was in an unauthorized state, they could exploit the flaw to execute API commands on the FortiManager and steal configuration data about managed devices.

Fortinet has released patches for the CVE-2024-47575 and offered mitigations, such as only allowing specific IP addresses to connect or preventing unknown FortiGate devices from registering using the set fgfm-deny-unknown enable command.

Exploited as a zero-day since June

Tonight, Mandiant reports that a threat actor tracked as UNC5820 has been exploiting FortiManager devices since as early as June 27, 2024.

“UNC5820 staged and exfiltrated the configuration data of the FortiGate devices managed by the exploited FortiManager,” reads the new report from Mandiant.

“This data contains detailed configuration information of the managed appliances as well as the users and their FortiOS256-hashed passwords.”

“This data could be used by UNC5820 to further compromise the FortiManager, move laterally to the managed Fortinet devices, and ultimately target the enterprise environment.”

The first observed attack was seen coming from 45.32.41[.]202, when the threat actors registered an unauthorized FortiManager-VM to an exposed FortiManager server.

This device was listed with the name “localhost” and utilized a serial number of “FMG-VMTM23017412,” as shown below.

Attacker-controlled FortiManager-VM
Attacker-controlled FortiManager-VM
Source: Mandiant

As part of the attack, Mandiant says four files were created:

  • /tmp/.tm – A gzip archive containing exfiltrated information about managed FortiGate devices, information about the FortiManager server, and its global database.
  • /fds/data/unreg_devices.txt – Contains the unregistered device’s serial number and IP address.
  • /fds/data/subs.dat.tmp – Unknown
  • /fds/data/subs.dat – This file contained the attacker-controlled device’s serial number, user ID, company name, and an email address.

In the first observed attack, the email address was “[email protected],” and the company name was “Purity Supreme.”

Mandiant says they analyzed the memory for a compromised device but found no signs of malicious payloads or tampering with system files.

While the attackers did exfiltrate data from devices, Mandiant says there have been no signs that UNC5820 utilized this sensitive information to spread laterally to the managed FortiGate devices or breach networks.

At this point, the stolen data may not be as valuable to the attackers, as Mandiant and Fortinet notified customers of the attacks. Hopefully, the customers modified their credentials and took other precautions.

As there was no follow-up activity after the initial attacks, Mandiant has not been able to determine the threat actor’s goal and where they may be located.

“As a result, at the time of publishing, we lack sufficient data to assess actor motivation or location. As additional information becomes available through our investigations, Mandiant will update this blog’s attribution assessment,” explained Mandiant.

Fortinet shared additional information inn its CVE-2024-47575 (FG-IR-24-423) advisory, including mitigation and recovery methods. The advisory also includes additional IOCs, including other IP addresses used by the attackers and log entries for detecting a compromised FortiManager server.

Lawrence Abrams

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
12:52 pm, Jun 22, 2025
weather icon 25°C
L: 24° | H: 27°
scattered clouds
Humidity: 49 %
Pressure: 1013 mb
Wind: 15 mph WSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 40%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
24° | 27°°C 0 mm 0% 17 mph 64 % 1013 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
15° | 23°°C 0.2 mm 20% 15 mph 81 % 1016 mb 0 mm/h
Tue Jun 24 10:00 pm
weather icon
14° | 26°°C 0 mm 0% 16 mph 77 % 1015 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
16° | 27°°C 0 mm 0% 9 mph 86 % 1013 mb 0 mm/h
Thu Jun 26 10:00 pm
weather icon
17° | 24°°C 1 mm 100% 15 mph 95 % 1018 mb 0 mm/h
Today 1:00 pm
weather icon
24° | 25°°C 0 mm 0% 15 mph 49 % 1013 mb 0 mm/h
Today 4:00 pm
weather icon
21° | 24°°C 0 mm 0% 17 mph 47 % 1013 mb 0 mm/h
Today 7:00 pm
weather icon
21° | 22°°C 0 mm 0% 13 mph 54 % 1012 mb 0 mm/h
Today 10:00 pm
weather icon
16° | 16°°C 0 mm 0% 10 mph 64 % 1012 mb 0 mm/h
Tomorrow 1:00 am
weather icon
16° | 16°°C 0 mm 0% 13 mph 76 % 1011 mb 0 mm/h
Tomorrow 4:00 am
weather icon
16° | 16°°C 0.2 mm 20% 13 mph 81 % 1011 mb 0 mm/h
Tomorrow 7:00 am
weather icon
15° | 15°°C 0.2 mm 20% 13 mph 60 % 1013 mb 0 mm/h
Tomorrow 10:00 am
weather icon
17° | 17°°C 0 mm 0% 13 mph 46 % 1014 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€89,111.93
-1.14%
Ethereum(ETH)
€1,972.93
-6.84%
Tether(USDT)
€0.87
0.02%
XRP(XRP)
€1.75
-5.47%
Solana(SOL)
€115.31
-6.66%
USDC(USDC)
€0.87
0.01%
Dogecoin(DOGE)
€0.134929
-4.93%
Shiba Inu(SHIB)
€0.000010
-4.95%
Pepe(PEPE)
€0.000008
-8.93%
Peanut the Squirrel(PNUT)
€0.218233
13.10%
Scroll to Top