FortiManager Critical CVE-2024-47575 “FortiJump” Allows RCE
Tags
cmtmf-attack-pattern: | Automated Exfiltration |
attack-pattern: | Data Model Models Credentials - T1589.001 Ip Addresses - T1590.005 Server - T1583.004 Server - T1584.004 Vulnerabilities - T1588.006 Automated Exfiltration - T1020 |
Common Information
Type | Value |
---|---|
UUID | 8f6615fb-515d-42e1-94c9-b3f42e10af10 |
Fingerprint | 2d37a196ab198b8d |
Analysis status | DONE |
Considered CTI value | 1 |
Text language | |
Published | Oct. 25, 2024, 12:37 a.m. |
Added to db | Oct. 25, 2024, 6:42 a.m. |
Last updated | Nov. 17, 2024, 12:53 p.m. |
Headline | FortiManager Critical CVE-2024-47575 “FortiJump” Allows RCE |
Title | FortiManager Critical CVE-2024-47575 “FortiJump” Allows RCE |
Detected Hints/Tags/Attributes | 29/2/16 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 205 | ✔ | Kudelski Security Research | https://research.kudelskisecurity.com/feed/ | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 87 | cve-2024-47575 |
|
Details | Domain | 65 | www.fortiguard.com |
|
Details | Domain | 39 | www.helpnetsecurity.com |
|
Details | Domain | 67 | www.tenable.com |
|
Details | File | 4 | revinfo.db |
|
Details | File | 7 | devices.txt |
|
Details | File | 4 | global.db |
|
Details | Mandiant Uncategorized Groups | 23 | UNC5820 |
|
Details | Url | 5 | https://www.fortiguard.com/psirt/fg-ir-24-423 |
|
Details | Url | 1 | https://www.helpnetsecurity.com/2024/10/24/cve-2024-47575 |
|
Details | Url | 1 | https://www.rapid7.com/blog/post/2024/10/23/etr-fortinet-fortimanager-cve-2024-47575-exploited-in-zero-day-attacks |
|
Details | Url | 3 | https://www.tenable.com/blog/cve-2024-47575-faq-about-fortijump-zero-day-in-fortimanager-fortimanager-cloud |
|
Details | Url | 1 | https://www.tenable.com/plugins/nessus/209559 |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-fortimanager-flaw-used-in-zero-day-attacks |
|
Details | Url | 1 | https://www.bleepingcomputer.com/news/security/mandiant-says-new-fortinet-fortimanager-flaw-has-been-exploited-since-june |
|
Details | Url | 4 | https://cloud.google.com/blog/topics/threat-intelligence/fortimanager-zero-day-exploitation-cve-2024-47575 |