1.0 Introduction
Recently, Fortinet has released security updates to address a malicious file from previously exploited Fortinet vulnerabilities (
CVE-2024-21762, CVE-2023-27997,
and
CVE-2022-42475)
within FortiGate products.
2.0 Impact
This malicious file could enable read-only access to files on the device’s file system, which may include configurations.
3.0 Affected Products
- FG-IR-22-398: Heap-based buffer overflow in sslvpnd
- FG-IR-23-097: Heap buffer overflow in sslvpn pre-authentication
- FG-IR-24-015: Out-of-outbound Write in sslvpnd
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the
Fortinet Security Updates for Multiple Products
and apply necessary updates.
- Upgrade to FortiOS versions 7.6.2, 7.4.7, 7.2.11, 7.0.17, 6.4.16 to remove the malicious file and prevent re-compromise.
Kindly refer to the following URL:
- https://community.fortinet.com/t5/FortiGate/Technical-Tip-Recommended-steps-to-execute-in-case-of-a/ta-p/230694
- https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity
Generally, we advise the users of the devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact us through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web:
https://www.mycert.org.my
5.0 References
- https://www.fortiguard.com/psirt/FG-IR-23-097
- https://www.fortiguard.com/psirt/FG-IR-22-398
- https://fortiguard.fortinet.com/psirt/FG-IR-24-015
- https://community.fortinet.com/t5/FortiGate/Technical-Tip-Standard-procedure-to-format-a-FortiGate-Log-Disk/ta-p/190473
- https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity
- https://www.fortiguard.com/psirt
- https://www.cisa.gov/news-events/alerts/2025/04/11/fortinet-releases-advisory-new-post-exploitation-technique-known-vulnerabilities