Fortinet Leaked VPN Account Credentials

Risk:
high
Damage:
high
Platform(s):
Web Servers
Advisory ID:
ngCERT-2021-0052
Version:
N/A
CVE:
CVE-2018-13379
Published:
September 10, 2021

Summary


A malicious actor has leaked a list of almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer. These credentials were reported to be obtained from systems that remained unpatched against FG-IR-18-384 / CVE-2018-13379 at the time of the actor's scan.

Description & Consequence


The list of Fortinet credentials was leaked for free by a threat actor known as 'Orange,' who is the administrator of the newly launched RAMP hacking forum and a previous operator of the Babuk Ransomware operation. Further analysis conducted by Advanced Intel shows that the IP addresses are for devices worldwide, with 2,959 devices located in the USA.

The leaked VPN credentials could allow threat actors to access a network to perform data exfiltration, install malware, and perform ransomware attacks.

Solution


It is advised that administrator of Fortinet VPN servers, should assume that many of the listed credentials are valid and take precautions. These precautions include performing a forced reset of all user passwords to be safe and to check your logs for possible intrusions.

It is recommended to disable all VPN (SSL-VPN or IPSEC) that may be enabled until the following remediation steps have been taken:

  • Upgrade to FortiOS 5.4.13, 5.6.8, 6.0.5 or 6.2.0 and above.
  • Treat all credentials as potentially compromised and perform an organization-wide password reset.
  • Fortinet recommend the implementation of multi-factor authentication, which will help mitigate the abuse of any compromised credentials now and in the future.

Reference


Revision


Related Articles