FortiJump: A Major Zero-Day Vulnerability

Prof Bill Buchanan OBE FRSE
2 min readOct 24, 2024

When you get a zero-day vulnerability that is rated for CVSS v3 at 9.8, you take notice [here]:

The vulnerability -named FortiJump — relates to the FortiManager network management solution from Fortinet and is published as CVE-2024–47575. Within October, Mandiant [here] has been working with Fortinet on a mass exploitation of FortiManager — with more than 50 devices likely to have been exploited. It has been shown that the UNC5820 group [here] has been using the vulnerability to harvest user credentials and other device details.

On 27 June 2024, it was detected that multiple FortiManager devices logged an inbound connections from 45.32.41.202 on TCP port 541 (and which is the default port for FortiManager access. These accesses then left to access to a number of files, including: /var/dm/RCS (config files of managed devices); /var/dm/RCS/revinfo.db (further information on devices); /var/fds/data/devices.txt (IP address of FortiGate devices); /var/pm2/global.db (containing policies); and /var/old_fmversion (build information). After this, an exploit on FortiManager was discovered. The known malicious IP addresses are: 45.32.41.202, 104.238.141.143, 158.247.199.37 and 45.32.63.2.

A scan on Shodan with a banner hex value of 0xAB, identifies a number of possible devices that are exposed to the vulnerability:

Conclusions

Investigations are ongoing, so we should hear a great deal about this vulnerability over the next few days. The current advice is:

  • Lock down access to FortiManager admin portal for trusted IP addresses.
  • Make sure that only trusted FortiGate devices can communicate with FortiManager, and block unauthorized devices.

--

--

Prof Bill Buchanan OBE FRSE
Prof Bill Buchanan OBE FRSE

Written by Prof Bill Buchanan OBE FRSE

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.