fortinet-warns-attackers-retain-fortigate-access-post-patching-via-ssl-vpn-symlink-exploit

Fortinet has disclosed that malicious entities have discovered a method to retain read-only access to susceptible FortiGate devices even after the original access point employed to compromise the devices was rectified.
The cybercriminals are thought to have exploited recognized and now-corrected security vulnerabilities, including, but not restricted to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762.
“A malicious actor utilized a recognized


Leave a Reply

Your email address will not be published. Required fields are marked *

Share This