Nearly 50,000 Fortinet devices remain vulnerable to a zero-day exploit, prompting urgent calls for patching from the vendor. The Shadowserver Foundation reports a significant number of exposed devices without the necessary security updates applied.
Fortinet customers are facing a critical security issue as nearly 50,000 management interfaces remain vulnerable to a newly discovered zero-day exploit . Data from the Shadowserver Foundation reveals that 48,457 Fortinet devices are still publicly exposed without the patch for CVE-2024-55591 applied, despite urgent warnings issued over the past week.
This vulnerability was identified on January 14th, and even two days later, the number of exposed devices stood at almost 52,000, highlighting a concerning lack of timely action.Customers in Asia are the most affected, with 20,687 vulnerable firewalls still accessible on the internet. North America and Europe follow with 12,866 and 7,401 vulnerable devices respectively. Fortinet has confirmed that CVE-2024-55591 is actively exploited by attackers, who are leveraging it to compromise credentials and gain administrator privileges within victim networks.The consequences of this exploit can be severe, as attackers with admin access can wreak havoc on systems, potentially leading to data breaches, ransomware attacks, or complete network disruption. Fortinet has urged all customers to immediately apply the necessary updates and implement recommended workarounds. The vendor has also acknowledged a recent data breach involving leaked credentials attributed to the Belsen Group, emphasizing the importance of updating security credentials and assessing firewall rule configurations.Fortinet's recent security woes are further compounded by a series of critical vulnerabilities and a controversial disclosure process involving a false claim about a toothbrush-based DDoS attack. The vendor's reputation has taken a hit, and the company is now facing the challenge of regaining customer trust and ensuring the security of its products.
FORTINET Zero-Day Exploit CVE-2024-55591 Security Vulnerability Patching Cybersecurity Threat Shadowserver Foundation Belsen Group Data Breach
United Kingdom Latest News, United Kingdom Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Fortinet Customers Under Fire as 50,000 Devices Remain Vulnerable to Active Zero-Day ExploitNearly 50,000 Fortinet management interfaces are still exposed to a critical zero-day vulnerability, actively exploited by attackers. The Shadowserver Foundation reports 48,457 vulnerable devices, with Asia experiencing the highest concentration of exposed firewalls. Fortinet urges immediate action to patch systems and implement workarounds.
Read more »
Customers Urged to Check Cupboards for Recalled Food ItemsThe Food Standards Agency (FSA) has issued recalls for several food products sold at Tesco, TK Maxx, Homesense and other retailers due to potential health risks caused by mislabeling, undeclared allergens, and the presence of Listeria monocytogenes.
Read more »
Greggs issues urgent steak bake warning over 'possible health risk'Customers have been urged to 'return to store now'
Read more »
Fortinet Firewalls Targeted in Mass Exploitation CampaignSecurity researchers have uncovered a significant campaign targeting Fortinet firewalls that may be exploiting an unknown zero-day vulnerability. The attackers gained access to devices, modified configurations, and used SSL VPN tunnels to maintain access and potentially move laterally within victim networks. Fortinet is reportedly investigating the matter.
Read more »
Fortinet Firewall Exploits: Mass Zero-Day Campaign UncoveredSecurity researchers have revealed a large-scale attack campaign targeting Fortinet firewalls, suspected to be leveraging an unpatched zero-day vulnerability. The campaign, peaking in December, involved malicious actors compromising numerous Fortinet devices, altering configurations, and establishing persistent connections through SSL VPN tunnels.
Read more »
Fortinet Confirms 2022 Zero-Day Exploit Leak by Belsen GroupFortinet officially acknowledges leaked FortiGate configurations stolen during a 2022 zero-day attack by the Belsen Group. The leaked data includes sensitive information like IP addresses, configurations, and passwords. While Fortinet emphasizes that most affected devices have been patched, users are urged to review security practices and potential vulnerabilities.
Read more »