> Back to All Posts

Fortinet Exposes Persistent Post-Exploitation Threat

Fortinet has issued a new security warning. Hackers still have access to patched FortiGate VPN devices. They use a hidden method that bypasses traditional detection.

Compromise Notification Sent to Customers

The company alerted affected customers via email. The message was titled: “Notification of device compromise – FortiGate / FortiOS – Urgent action required.”

This notification carried a TLP:AMBER+STRICT label, showing high-risk urgency.

No New Exploits, But Persistence Remains

This issue is not due to a new vulnerability. Instead, attackers left behind symbolic links during earlier breaches. These links provide read-only access through the SSL-VPN web interface.

Attackers Exploited Known CVEs

The hackers used old vulnerabilities such as:

  • CVE-2022-42475

  • CVE-2023-27997

  • CVE-2024-21762

They gained access and planted symbolic links in the folder that serves language files. This technique created persistent access without triggering alerts.

Security Patches May Not Fully Remove Risk

Even after customers updated FortiOS, the symbolic links remained. This lets threat actors access the root filesystem and configuration files.

Fortinet urged customers to upgrade to the latest firmware versions:

  • 7.6.2

  • 7.4.7

  • 7.2.11

  • 7.0.17

  • 6.4.16

Security Teams Urged to Act Immediately

Admins should inspect their systems for suspicious changes. Fortinet recommends reviewing configuration files and resetting compromised credentials. A support document offers detailed cleanup instructions.

CERT-FR Confirms Widespread, Ongoing Campaign

CERT-FR, part of France’s national cybersecurity agency, confirmed the attacks began in early 2023. It observed widespread compromise across French networks. Attackers may have moved laterally after breaching VPN devices. The U.S. CISA advised all defenders to report suspicious activity. Contact them at Report@cisa.gov or call (888) 282-0870 for support.

VPN Group Recommends Strong Forensic Checks

At VPN Group, we advise a full review of patched systems. Even fixed devices may hide backdoors. Security teams must isolate affected VPNs, reset credentials, and scan for network movement.

David McAfee

David McAfee is a seasoned cybersecurity expert with over a decade of experience at VPN Group. Specializing in online privacy and digital security, he has played a key role in developing advanced strategies to protect individuals and organizations from cyber threats.