🛡 H3lium@infosec.exchange/:~# :blinking_cursor:<p>"🚨 <a href="https://infosec.exchange/tags/FortinetFlaw" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FortinetFlaw</span></a> Alert! RCE Vulnerability in SSL VPN - Act Now! 🚨"</p><p>Fortinet's SSL VPN is in the spotlight due to a newly discovered RCE vulnerability, potentially exploited in recent attacks due to the existence of an exploit being publicly available. Identified as CVE-2022-40684 (FG-IR-24-015) (Critical/9.8 rating), this flaw allows unauthenticated attackers to execute arbitrary code. Upgrading to version 6.2.16, 6.4.15, 7.0.14, 7.2.7 or 7.4.3 eliminates this vulnerability. Security researchers urge immediate patching as exploits are likely circulating. 🛡️💻🔐</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/PatchNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchNow</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/SSLVPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSLVPN</span></a> <a href="https://infosec.exchange/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a></p><p>Source: <a href="https://www.bleepingcomputer.com/news/security/new-fortinet-rce-flaw-in-ssl-vpn-likely-exploited-in-attacks/" rel="nofollow noopener" target="_blank">BleepingComputer</a>, <a href="https://www.tenable.com/plugins/nessus/190238" rel="nofollow noopener" target="_blank">Tenable</a></p><p>Tags: <a href="https://infosec.exchange/tags/CVE2022" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE2022</span></a>-40684 <a href="https://infosec.exchange/tags/FORTIOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FORTIOS</span></a> <a href="https://infosec.exchange/tags/SecurityUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityUpdate</span></a> <a href="https://infosec.exchange/tags/Mitigation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mitigation</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/FGIR24015" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FGIR24015</span></a></p>