Fortinet

Fortinet

The article highlights that Fortinet’s FortiOS and FortiProxy systems were severely compromised in Q1 2025 due to the CVE-2024-55591 race condition authentication bypass flaw, enabling attackers to bypass firewall security. This vulnerability was actively exploited by threat actors to gain unauthorized access, potentially leading to unauthorized data exposure, system infiltration, and lateral movement within corporate networks. Given Fortinet’s widespread use in enterprise and critical infrastructure, the breach poses a high risk of operational disruption, data theft, or further malware deployment (e.g., BunnyLoader, which was prevalent in 40% of attacks). The manufacturing sector—Fortinet’s primary client base—was the most targeted, amplifying the risk of supply chain attacks, intellectual property theft (e.g., patents), or production halts if firewalls were breached. While the article does not specify direct financial or customer data leaks, the exploitation of such a critical flaw in security infrastructure inherently threatens organizational resilience, regulatory compliance, and trust erosion, particularly if follow-on attacks (e.g., ransomware or APTs) materialized. The incident underscores systemic risks when core security products become attack vectors.

Source: https://www.scworld.com/brief/stolen-insecure-credentials-behind-most-breaches

TPRM report: https://www.rankiteo.com/company/fortinetfederal

"id": "for0560705113025",
"linkid": "fortinetfederal",
"type": "Vulnerability",
"date": "6/2024",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'industry': ['Manufacturing',
                                     'Business Services',
                                     'Communications',
                                     'Healthcare',
                                     'Retail',
                                     'Finance']}],
 'attack_vector': ['Valid Account Credentials (No MFA) - 56%',
                   'Vulnerability Exploitation (CVE-2024-55591 - '
                   'FortiOS/FortiProxy)',
                   'Brute Force Attacks',
                   'Exposed Remote Desktop Protocol (RDP)',
                   'SEO Poisoning',
                   'Exposed Remote Monitoring and Management (RMM) Tools',
                   'BunnyLoader Malware-as-a-Service (40% of attacks)'],
 'data_breach': {'sensitivity_of_data': 'High (Authentication Credentials)',
                 'type_of_data_compromised': ['Credentials (via BunnyLoader)']},
 'date_publicly_disclosed': '2025-06-01T00:00:00Z',
 'description': 'Valid account credentials without multi-factor authentication '
                '(MFA) remained the dominant initial access vector in '
                'cyberattacks during Q1 2025, accounting for 56% of incidents. '
                'Vulnerability exploitation (e.g., FortiOS/FortiProxy '
                'CVE-2024-55591) and brute force attacks were also prevalent. '
                'BunnyLoader malware-as-a-service (loading credential theft '
                'and additional payloads) was used in 40% of attacks. Targeted '
                'industries included manufacturing (most affected), followed '
                'by business services, communications, healthcare, retail, and '
                'finance. Attack vectors included exposed RDP, SEO poisoning, '
                'and RMM tools.',
 'impact': {'identity_theft_risk': 'High (Credential Theft via BunnyLoader)',
            'systems_affected': ['Firewalls (via CVE-2024-55591)',
                                 'Systems with Exposed RDP/RMM']},
 'initial_access_broker': {'entry_point': ['Valid Credentials (No MFA)',
                                           'Exploited Vulnerabilities '
                                           '(CVE-2024-55591)',
                                           'Exposed RDP/RMM'],
                           'high_value_targets': ['Manufacturing',
                                                  'Business Services',
                                                  'Healthcare']},
 'investigation_status': 'Ongoing (Trend Analysis)',
 'lessons_learned': 'Multi-factor authentication (MFA) remains critical to '
                    'mitigating credential-based attacks. Patching known '
                    'vulnerabilities (e.g., CVE-2024-55591) and securing '
                    'exposed services (RDP/RMM) are essential. '
                    'Malware-as-a-service (e.g., BunnyLoader) highlights the '
                    'need for endpoint detection and response (EDR) solutions.',
 'post_incident_analysis': {'corrective_actions': ['Mandate MFA for all user '
                                                   'and service accounts.',
                                                   'Accelerate vulnerability '
                                                   'management cycles.',
                                                   'Implement zero-trust '
                                                   'network access controls.',
                                                   'Enhance threat '
                                                   'intelligence sharing for '
                                                   'emerging malware strains.'],
                            'root_causes': ['Lack of MFA enforcement',
                                            'Unpatched critical '
                                            'vulnerabilities (e.g., '
                                            'FortiOS/FortiProxy)',
                                            'Exposed remote access services '
                                            '(RDP/RMM)',
                                            'Effective malware-as-a-service '
                                            '(BunnyLoader) proliferation']},
 'recommendations': ['Enforce MFA across all accounts, especially for remote '
                     'access.',
                     'Patch critical vulnerabilities promptly (e.g., '
                     'FortiOS/FortiProxy).',
                     'Monitor for exposed RDP/RMM services and SEO poisoning '
                     'campaigns.',
                     'Deploy EDR/XDR solutions to detect malware loaders like '
                     'BunnyLoader.',
                     'Conduct regular threat hunting for credential theft '
                     'indicators.'],
 'references': [{'date_accessed': '2025-06-01',
                 'source': 'Infosecurity Magazine'},
                {'date_accessed': '2025-06-01',
                 'source': 'Rapid7 Research (Infosecurity Europe 2025)'}],
 'title': 'Q1 2025 Cybersecurity Incident Trends: Credential-Based Attacks and '
          'Vulnerability Exploits Dominate',
 'type': ['Unauthorized Access',
          'Malware Infection',
          'Vulnerability Exploitation'],
 'vulnerability_exploited': ['CVE-2024-55591 (FortiOS/FortiProxy Race '
                             'Condition Authentication Bypass)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.