5 Alarming Facts About Persistent Hacker Access to Patched FortiGate VPNs


Fortinet email

Introduction

Fortinet has recently issued a critical warning regarding a sophisticated post-exploitation technique that enables threat actors to maintain unauthorized read-only access to FortiGate VPN devices, even after vulnerabilities have been patched.

How Hackers Maintain Access

Attackers have leveraged symbolic links in device language files folders, linking directly to the root filesystem. This breach tactic specifically targets devices with SSL-VPN enabled and allows hackers ongoing access via the publicly available SSL-VPN web panel.

Detailed Advisory by Fortinet

Upon discovering unusual activities, Fortinet emailed affected customers urging immediate action. Fortinet confirmed that this exploitation did not stem from a new vulnerability but rather from overlooked modifications during previous breaches involving CVE identifiers CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762.

Global Impact and Response

The exploitation technique has reportedly been part of a massive series of attacks since early 2023, notably impacting numerous devices across France. Both the French Computer Emergency Response Team (CERT-FR) and the Cybersecurity and Infrastructure Security Agency (CISA) have acknowledged the severity of this situation and recommended network defenders report any anomalies.

Urgent Recommendations for Network Administrators

  • Immediate Firmware Updates: Fortinet advises installing the latest firmware updates to eliminate any backdoors left by attackers.
  • Rigorous Configuration Reviews: Administrators should promptly check for any unusual configuration changes.
  • Isolate and Reset: Isolating affected VPN devices and resetting all sensitive information is crucial to prevent further damage.

Preventive Measures and Further Guidance

For detailed steps on safeguarding devices against such vulnerabilities, Fortinet has provided extensive guidance for resetting potentially exposed credentials and reinforcing security measures.

Stay Informed and Secure

Understanding the tactics employed by cybercriminals can significantly enhance an organization’s defense mechanisms. Regularly updating systems and staying vigilant about security advisories is paramount.

Conclusion

While Fortinet has been proactive in notifying customers and patching known vulnerabilities, the persistence of unauthorized access highlights the need for continual vigilance and immediate action in cybersecurity practices.

For more information, refer to the original advisory and ensure your network’s security parameters are up to date.

Related: Western Sydney University discloses security breaches, data leak

Last Updated: April 11, 2025