Fortinet Alerts: Attackers Maintain Read-Only Access to FortiGate Devices After Patching Using SSL-VPN Symlink Exploit

April 11, 2025
Network Security / Vulnerability

Fortinet has disclosed that cybercriminals have discovered a method to preserve read-only access to compromised FortiGate devices, even after vulnerabilities exploited for initial breaches have been patched. The attackers reportedly utilized known security weaknesses, including CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. “A threat actor exploited a known vulnerability to establish read-only access to affected FortiGate devices,” the network security firm stated in an advisory released Thursday. “This was accomplished by creating a symbolic link that connects the user file system with the root file system in a directory used for SSL-VPN language files.” Fortinet noted that these alterations occurred within the user file system and were able to evade detection, leaving the symlink intact even after the original vulnerabilities were remedied. This situation has enabled the attackers to retain access…

Fortinet Warns of Persistent Access Threats to FortiGate Devices Post-Patching

On April 11, 2025, Fortinet disclosed concerning information regarding a persistent security vulnerability affecting its FortiGate devices. The network security firm reported that cybercriminals have successfully established read-only access to affected devices, even after the vulnerabilities exploited to initially breach these systems were patched. This revelation highlights ongoing risks for organizations using FortiGate technology, particularly in the evolving landscape of cyber threats.

The threat actors allegedly exploited several known security vulnerabilities before the patches were released, including CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. Fortinet’s advisory detailed that these vulnerabilities enabled attackers to craft a symbolic link between the user file system and the root file system within the directory serving language files for the SSL-VPN. This symlink, or symbolic link, effectively allowed attackers to maintain a connection to the devices, circumventing detection even after the immediate security gaps were addressed.

The modifications made by the adversaries occurred within the user file system, indicating a coordinated effort to evade security measures. Such tactics not only prolong the attackers’ presence on the devices but also pose a significant threat to the integrity and confidentiality of sensitive user data. Organizations relying on FortiGate devices may find themselves vulnerable, underscoring the necessity of comprehensive monitoring and forensic analysis following any patching efforts.

The implications of this vulnerability extend beyond immediate access concerns; they highlight crucial adversary tactics as outlined in the MITRE ATT&CK framework. Notably, the methods leveraged by the attackers may involve techniques associated with initial access and persistence, mechanisms used to secure ongoing control over compromised systems. This situation serves as a stark reminder of the persistent threat landscape that businesses face, necessitating proactive measures to monitor for indicators of compromise even after vulnerabilities have been addressed.

Although Fortinet has implemented fixes for the identified security flaws, the existence of the symlink illustrates a broader challenge in cybersecurity. It emphasizes the need for robust security protocols and post-patch evaluations to ensure that attackers cannot retain access to systems. Consequently, organizations must cultivate a culture of vigilance, employing advanced threat detection and response strategies to defend against persistent cyber threats.

In conclusion, the findings shared by Fortinet underline the critical need for businesses to adopt a multifaceted approach to cybersecurity, especially when dealing with prominent network security devices like FortiGate. As cyber threats evolve, it is imperative for organizations to remain informed, adapting their security measures to safeguard sensitive information and maintain operational integrity.

Source link