The remote code execution bug was exploited to open vulnerable servers through backdoors.
An unknown attacker has exploited a critical vulnerability in Fortinet’s SSL VPN FortiOS to infect governments and government-related organizations with advanced, custom-made malware, the company said in an autopsy report on Wednesday.
The vulnerability tracked as CVE-2022-42475 is a heap-based buffer overflow that allows hackers to remotely execute malicious code. It has a severity rating of 9.8 out of a possible 10. Fortinet, a network security software maker, fixed the vulnerability in version 7.2.3 released on November 28, but neglected to mention the threat in the release notes it released at the time.
Sources :