FortiOS SSL-VPN zero-day flaws exploited to attack government organizations

There have been a number of attacks against government organizations and government-related targets using FortiOS SSL VPN zero-day vulnerabilities that were patched by Fortinet last month and exploited by unknown attackers.

These incidents exploited a vulnerability (CVE-2022-42475) to allow attackers to remotely execute code and remotely crash target devices.

This vulnerability can be attributed to a heap-based buffer overflow in the FortiOS SSLVPNd application.

The network security company quietly fixed the bug on November 28 by releasing a new version (7.2.3) of the software that fixes the vulnerability.

In mid-December, the company urged its customers to download and install this patch to protect against the ongoing attacks that exploit the vulnerability without making any noise.

The network security company first notified its customers of the vulnerability on December 7 through a TLP: Amber Advisory, a confidential notification intended for restricted distribution.

They later made additional information about the vulnerability publicly available on December 12, along with a warning that the vulnerability was actively being exploited and attacked by attackers in ongoing attacks.

How is 0 days found?

How do hackers find zero days? Looking for vulnerabilities: Attackers search the code for vulnerabilities. In some cases, zero-day exploits are sold (and bought) by hackers. 2. Vulnerability found: Attackers find a vulnerability in the software or operating system unknown to the original developers.

How do people find 0days?

These are usually found by programmers and coders. You can look through the code and find a security bug or something. A zero-day exploit is just an exploit that the creator or developers are unaware of. Therefore, the hackers usually dissect and reverse engineer the code until they find the zero-day.

How is zero-day vulnerability found?

A zero-day vulnerability is a software vulnerability that is discovered by attackers before the vendor is aware of it. Because vendors don’t know this, there is no patch for zero-day vulnerabilities, so attacks are likely to be successful.

What is a day 1 exploit?

Day-one exploits are responsible for attacks like the recent Microsoft Exchange attack, which compromised hundreds of thousands of businesses. This started as a zero-day exploit and was followed by numerous day-one exploits once the vulnerabilities became known.

What does 0-day exploit mean? A zero-day exploit is the technique or tactic used by a malicious actor to exploit the vulnerability to attack a system. A zero-day attack occurs when a hacker releases malware to exploit the software vulnerability before the software developer has patched the bug.

What is a day-one vulnerability?

Once a zero-day vulnerability is published, it is referred to as an n-day or one-day vulnerability. Typically, when someone discovers that a software program contains a potential security problem, that person or company notifies the software company (and sometimes the entire world) so that action can be taken.

How much does a zero-day exploit cost?

Zero-day exploits are incredibly expensive, and we’ve seen threat actors claim they could disappear for as much as $10,000,000 during our investigations. These prices can seem huge, but there is one key aspect to keep in mind,” reads the article published by Digital Shadows experts.

Why are zero-day vulnerabilities so hard to mitigate?

The Threat of a Zero-Day Exploit Exploits are very difficult to counter because data about the exploit is typically not available for analysis until after the attack is complete. These attacks can come in the form of polymorphic worms, viruses, Trojan horses, and other malware.

What are the risks of zero-day exploits? A zero-day exploit is one of the most serious malware threats. Cyber ​​attacks can have serious consequences for businesses as hackers can steal money, data or intellectual property, putting your operations at risk. And no company is immune.

Why is a zero-day attack difficult to detect?

By definition, zero-day attacks are difficult to detect because there are currently no antivirus signatures or patches for them. To find previously undiscovered software vulnerabilities, there are numerous methods of zero-day vulnerability detection.

Why is zero-day malware a powerful weapon for hackers?

A zero-day attack (or 0-day attack) is a software vulnerability that is exploited by attackers before the vendor is aware of it. At this time, no patch is in place, so attackers can easily exploit the vulnerability knowing no mitigations are in place. This makes zero-day vulnerabilities a serious security threat.

Is there protection against zero-day attacks?

There is no one-size-fits-all approach to mitigating zero-day attacks. But applying a range of defense strategies and tactics in a coordinated (and ideally automated) manner can help minimize your threat surface.

Sources :