Last Updated: 2022-10-12 09:15:26 UTC
by Johannes Ullrich (Version: 1)
This last few days, I saw a few requests associated with an older Fortigate vulnerability hitting our honeypots:
GET /remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession HTTP/1.1
These requests attempt to exploit CVE-2018-13379, an older vulnerability, as indicated by the CVE number. One concern was if these scans are related to the new issue Fortigate patched last week, CVE-2022-40684 is an authentication bypass vulnerability that was patched last week and is already being exploited, according to Fortigate. However, the scan above is looking for the SSL VPN console, which is not affected by the new vulnerability.
Still: Make sure that your FortiGate devices are up to date. These scans may still be helpful to fingerprint devices and to build a target list. These targets could later be exploited after an exploit is released. The Horizon 3 Attack Team promised to release a PoC exploit this week.
The scans originate from 126.96.36.199, an IP with a history of scans for web vulnerabilities.