ioc.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
INDICATORS OF COMPROMISE (IOC) InfoSec Community within the Fediverse. Newbies, experts, gurus - Everyone is Welcome! Instance is supposed to be fast and secure.

Administered by:

Server stats:

1.6K
active users

#fortinet

18 posts14 participants0 posts today

Oh man, Fortinet *yet again*! 😅 A symlink bug that *still grants* read-only access even after updates? Seriously, that's my kind of 'funny'! 😂

It just goes to show how crucial manual testing really is. You know, the kind of thing automated scans often just don't catch. Our clients are *always* relieved when we spot these things before a malicious actor does! 👌

So yeah, updates are vital, but *don't forget* to double-check those configs! Otherwise, attackers might still have a foothold, even after you've 'patched'.

Just remember: Security isn't just a product you buy; it's an ongoing process. And let's be real, it also needs to fit the budget. 🤷‍♂️

What persistence tricks do you all have up your sleeve? 🤔

Whoa, FortiSwitch alert! 🚨 We all know unpatched switches are basically a welcome mat for attackers, right? It sounds familiar: small device, potentially *huge* headache. 🤦‍♂️

Heads up on **CVE-2024-48887**. This one's nasty: it could let someone change the admin password *without even logging in*. Yeah, you read that right. With a **CVSS score of 9.3**, that's seriously critical!

**Bottom line: You need to update ASAP.** Get your switches to version **6.4.15, 7.0.11, 7.2.9, 7.4.5, or 7.6.1** like, yesterday! 💪

Trust me, as a pentester, I see this scenario play out way too often. It's usually the seemingly "small stuff" that ends up causing massive breaches across entire networks. Don't let that be you. 🙄

Beyond patching, **lock down that HTTP/HTTPS management access!** Seriously limit *who* and *what* can even reach the switch's interface. Do it **NOW!**

Even if there isn't a widely available exploit *yet*, don't gamble and wait for one to appear. Procrastination is not your friend here. ⏳

So, real talk: How often are you *actually* getting around to patching your network devices? Drop a comment below! 🤔

CERT.at investigates ransomware attacks via critical Fortinet vulnerabilities (FortiOS, FortiProxy) and recommends urgent forensic investigations of all devices that didn't have FortiOS 7.0.16 installed before 2025-01-27, when the PoC for CVE-2024-55591 was published. Those devices may be compromised despite having been patched later.

Check (German) warning by @CERT_at
cert.at/de/warnungen/2025/3/ra

Long story with Forescout:
forescout.com/blog/new-ransomw