Attackers exploit FortiGate devices to access sensitive network information
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章讲的是攻击者利用FortiGate设备入侵企业网络,窃取配置数据和敏感信息。SentinelOne的研究人员提到,攻击者通过漏洞或弱密码获取初始访问权限,然后提取配置文件,这些文件包含服务账户凭证和网络结构信息。目标行业包括医疗、政府和 MSP。 攻击者利用了几个CVE漏洞,比如CVE-2025-59718、CVE-2025-59719和CVE-2026-24858,通过SSO签名验证漏洞获得无认证的管理员访问权限。此外,他们还创建本地管理员账户,修改防火墙策略,并使用PowerShell和DLL侧加载执行恶意软件。 文章还提到NGFW设备因为集成AD而成为高价值目标。建议企业加强行政控制、保持软件更新,并保留足够的日志以便检测异常。 现在我要把这些信息浓缩到100字以内。首先确定关键点:攻击者利用FortiGate设备入侵网络,窃取配置数据和敏感信息;目标行业;利用的漏洞;攻击手段;建议措施。 可能的结构:攻击者利用FortiGate设备漏洞或弱密码入侵企业网络,窃取配置数据和敏感信息。目标包括医疗、政府和MSP。攻击者利用SSO漏洞获取管理员权限,并部署恶意软件。建议加强行政控制、更新软件并保留日志。 </think> Attackers exploit FortiGate devices via vulnerabilities or weak credentials to access corporate networks, steal configuration data, and deploy malware. Targeted sectors include healthcare, government, and MSPs. Attackers use SSO flaws to gain admin access, modify firewall policies, and extract sensitive info. Organizations should secure NGFWs with strong controls, patches, and adequate logging to detect and respond to threats. 2026-3-10 19:2:57 Author: securityaffairs.com(查看原文) 阅读量:10 收藏

Attackers exploit FortiGate devices to access sensitive network information

Attackers are exploiting FortiGate devices to breach networks and steal configuration data containing service account credentials and network details.

SentinelOne researchers warn that attackers are exploiting vulnerabilities or weak credentials in FortiGate devices to gain initial access to corporate networks. Once inside, they extract configuration files that may contain service account credentials and information about the internal network structure. The campaign appears to target sectors such as healthcare, government agencies, and managed service providers.

“Throughout early 2026, SentinelOne’s® Digital Forensics & Incident Response (DFIR) team has responded to several incidents where FortiGate Next-Generation Firewall (NGFW) appliances have been compromised to establish a foothold into the targeted environment.” states SentinelOne. “Each incident was detected and stopped during the lateral movement phase of the attack.”

FortiGate appliances, often integrated with AD and LDAP, allow role mapping and fast response for network alerts. Threat actors have abused this access by targeting CVE-2025-59718 and CVE-2025-59719, exploiting SSO signature validation flaws to gain unauthenticated admin access. CVE-2026-24858 allowed attackers to log in through FortiCloud SSO. Once inside, they can extract configuration files containing service accounts, while others exploit weak credentials without needing a vulnerability.

In one case analyzed by Sentinel One, attackers created local admin accounts, modified firewall policies, and periodically checked access before extracting configuration files containing encrypted LDAP service account credentials. These were decrypted to authenticate to Active Directory and enroll rogue workstations, allowing deeper network access.

In another incident, attackers created admin accounts, deployed Pulseway and MeshAgent RMM tools, and used PowerShell and DLL side-loading to execute malware. They staged malicious payloads on cloud storage (Google Cloud, AWS S3), ran tasks to maintain persistence, and used PsExec to move laterally.

The attackers made a backup of the main domain controller, took the NTDS.dit file and SYSTEM registry data, compressed them, and uploaded them to their servers. After the incident was contained, no further misuse of accounts was seen.

Next-generation firewalls (NGFWs), like FortiGate, are widely used because they combine strong network security with features like Active Directory integration. This makes them high-value targets for attackers, from state-sponsored espionage groups to financially motivated criminals. Recent research shows that even less skilled actors can now exploit these devices more easily using AI tools like large language models (LLMs), which provide guidance on navigating networks and extracting sensitive data.

Organizations should secure NGFWs by enforcing strong administrative controls, keeping software patched, and maintaining adequate log retention (at least 14–90 days). Logs should be sent to a SIEM system to detect anomalies, track unauthorized account creation, monitor for configuration access, spot malware or C2 traffic, preserve evidence, and enable automated responses to neutralize threats quickly.

“Organizations should consider that FortiGate and other edge devices typically do not permit security software to be installed on the appliance, such as endpoint detection and response (EDR) tools. The best defense for these appliances is to apply strong administrative access controls and to keep the software patched to prevent exploitation.” concludes the report. “Further, both of these investigations were hindered by insufficient FortiGate log retention. Organizations should ensure they have at least 14 days of log retention on NGFW appliances like FortiGate, though 60-90 days is much better when possible.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Fortinet)




文章来源: https://securityaffairs.com/189241/security/attackers-exploit-fortigate-devices-to-access-sensitive-network-information.html
如有侵权请联系:admin#unsafe.sh