{"vulnerability": "CVE-2024-23113", "sightings": [{"uuid": "294a95c8-6d0c-4143-b555-c8d7560e913c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:23:30.373261Z"}, {"uuid": "b087b05c-d392-4391-b38c-f69e047ee0a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-23113", "type": "confirmed", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:23:33.450898Z"}, {"uuid": "9e3c26d6-46aa-4440-8450-2dcfdae90065", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-23113", "type": "seen", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:23:35.506694Z"}, {"uuid": "b7e77c02-67bc-47e9-be60-0c346226e38c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-10-09T18:10:02.000000Z"}, {"uuid": "b56e0332-5622-403e-9983-a44bf1faf28c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "MISP/eb740424-b73f-401b-9b79-f1d5085e106d", "content": "", "creation_timestamp": "2024-02-19T20:40:01.000000Z"}, {"uuid": "2095f91e-a872-497a-9e21-a086c19a894a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-23113", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113482323234195101", "content": "", "creation_timestamp": "2024-11-14T16:47:13.243398Z"}, {"uuid": "4cbadeab-5c04-4589-983b-f52d02f7a62d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-23113", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/113483673211675864", "content": "", "creation_timestamp": "2024-11-14T22:30:43.910677Z"}, {"uuid": "d1e7496e-d6d2-44b1-b256-2be2b0994dfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-23113", "type": "seen", "source": "https://chaos.social/users/HonkHase/statuses/113492318503579152", "content": "", "creation_timestamp": "2024-11-16T11:56:29.753500Z"}, {"uuid": "9859520d-ad02-49ca-aadf-6e61e69947ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://infosec.exchange/users/harrysintonen/statuses/113627170010946952", "content": "", "creation_timestamp": "2024-12-10T06:43:39.589933Z"}, {"uuid": "8f31aa9b-c7d4-4f2e-89fb-0f4be726f3a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-23113", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113828003758066396", "content": "", "creation_timestamp": "2025-01-14T17:58:19.568174Z"}, {"uuid": "d63af7a0-43bb-4ec3-8d12-6a9defeffe0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "MISP/f7787455-9994-4047-b6f7-77347597c104", "content": "", "creation_timestamp": "2025-08-26T18:36:20.000000Z"}, {"uuid": "1ad28dc6-57d5-4ed7-bde2-f975c875b66c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:00.000000Z"}, {"uuid": "678bbfe4-ca77-4ac7-a5c5-e0c1f23bebaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://www.cert.at/de/warnungen/2024/2/kritische-sicherheitslucken-in-fortinet-fortios-updates-verfugbar", "content": "", "creation_timestamp": "2024-02-09T08:40:20.000000Z"}, {"uuid": "8721a2d3-de6c-4a7f-b4a1-a63a325aa561", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://bsky.app/profile/cecallihelper.bsky.social/post/3lnkzrwu5xs2b", "content": "", "creation_timestamp": "2025-04-24T15:33:21.504779Z"}, {"uuid": "2f59cfe8-8d81-4979-948f-83cc3f8bedea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lv6dbvxfel2o", "content": "", "creation_timestamp": "2025-07-30T09:40:14.258921Z"}, {"uuid": "bc26dcc9-4143-47f8-9636-19da3b50e79b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1225", "content": "", "creation_timestamp": "2024-02-09T04:00:00.000000Z"}, {"uuid": "dbc43cfb-6c0e-4603-8f28-cb537eee4359", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_8/2024", "content": "", "creation_timestamp": "2024-02-09T10:14:28.000000Z"}, {"uuid": "5e6b06a8-30de-4938-babb-7671d7e3627b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://vulnerability.circl.lu/comment/a1cef39c-8b09-4347-95bb-f4ffedfafccf", "content": "", "creation_timestamp": "2024-10-13T15:21:32.545076Z"}, {"uuid": "57967c91-5eb7-423d-9a97-c77d27b7c3ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304ca", "content": "", "creation_timestamp": "2025-02-28T23:49:13.272798Z"}, {"uuid": "217a4b54-b9ce-40e2-9d80-66e5ffafa425", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/78a4f3c7-077d-4afa-945e-9cc0d076a86d", "content": "", "creation_timestamp": "2026-02-02T12:26:26.614235Z"}, {"uuid": "27f49891-5f59-4b48-abf8-713ca375f6cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8854", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aRepository for CVE-2024-23113\nURL\uff1ahttps://github.com/zgimszhd61/CVE-2024-23111\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-27T17:43:03.000000Z"}, {"uuid": "bffa1f1e-c6c4-43eb-83a6-359409c3cb5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8836", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113-Private-POC\nURL\uff1ahttps://github.com/groshi/CVE-2024-23113-Private-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-25T11:46:10.000000Z"}, {"uuid": "b7bd0b5a-bed2-4e0c-9463-33b044b273b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8876", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 \u662f\u5b58\u5728\u4e8e\u67d0\u7279\u5b9a\u8f6f\u4ef6\u6216\u7cfb\u7edf\u4e2d\u7684\u4e00\u4e2a\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u5141\u8bb8\u6076\u610f\u653b\u51fb\u8005\u5728\u7279\u5b9a\u6761\u4ef6\u4e0b\u5229\u7528\u7cfb\u7edf\u4e2d\u7684\u7f3a\u9677\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u7684\u884c\u4e3a\u3002\u8fd9\u79cd\u884c\u4e3a\u53ef\u80fd\u5305\u62ec\u4f46\u4e0d\u9650\u4e8e\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3001\u8bbf\u95ee\u654f\u611f\u4fe1\u606f\u6216\u4ee5\u66f4\u9ad8\u6743\u9650\u6267\u884c\u64cd\u4f5c\u3002\nURL\uff1ahttps://github.com/zgimszhd61/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-29T08:23:08.000000Z"}, {"uuid": "71938a5d-3c44-4a38-ac13-eea662e9a4cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8929", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPOC TO RCE\nURL\uff1ahttps://github.com/radoslavatanasov1/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-02T12:30:21.000000Z"}, {"uuid": "e075c69c-efdf-498f-b835-8c68b65c957e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6766", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 FortiOS SSL VPN RCE\nURL\uff1ahttps://github.com/tr1pl3ight/CVE-2024-23113-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-09T03:10:07.000000Z"}, {"uuid": "34dcbabe-ea4c-4639-ba73-d811ded18add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8869", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113-Private-POC\nURL\uff1ahttps://github.com/hatvix1/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-28T18:03:29.000000Z"}, {"uuid": "de2b5b2c-0043-4e76-97f4-74835f8d6247", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/658", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 \u662f\u5b58\u5728\u4e8e\u67d0\u7279\u5b9a\u8f6f\u4ef6\u6216\u7cfb\u7edf\u4e2d\u7684\u4e00\u4e2a\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u5141\u8bb8\u6076\u610f\u653b\u51fb\u8005\u5728\u7279\u5b9a\u6761\u4ef6\u4e0b\u5229\u7528\u7cfb\u7edf\u4e2d\u7684\u7f3a\u9677\u5b9e\u73b0\u672a\u7ecf\u6388\u6743\u7684\u884c\u4e3a\u3002\u8fd9\u79cd\u884c\u4e3a\u53ef\u80fd\u5305\u62ec\u4f46\u4e0d\u9650\u4e8e\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3001\u8bbf\u95ee\u654f\u611f\u4fe1\u606f\u6216\u4ee5\u66f4\u9ad8\u6743\u9650\u6267\u884c\u64cd\u4f5c\u3002\nURL\uff1ahttps://github.com/zgimszhd61/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-29T13:12:36.000000Z"}, {"uuid": "081184b5-ee10-4c6d-a0fe-42cf8c79129c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6773", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 Exploit with More than 20000 Targets\nURL\uff1ahttps://github.com/labesterOct/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-10T07:36:43.000000Z"}, {"uuid": "30829517-2cc5-4584-89a1-1f843847c41f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6772", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 FortiOS SSL VPN RCE\nURL\uff1ahttps://github.com/foxymoxxy/CVE-2024-23113-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2025-02-06T11:50:09.000000Z"}, {"uuid": "56bee9b5-32ed-4fe6-a226-ddd9e5d71377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/kasperskyb2b/1445", "content": "\u26a0\ufe0f \u041f\u043e\u0447\u0442\u0438 \u0444\u043b\u044d\u0448-\u0440\u043e\u044f\u043b\u044c: \u043f\u0430\u0442\u0447\u0438\u043c Fortinet, Palo Alto \u0438 Ivanti\n\n\u0421\u043b\u043e\u0436\u043d\u0430\u044f \u043d\u0435\u0434\u0435\u043b\u044c\u043a\u0430 \u0434\u043b\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0430 \u0433\u043b\u0430\u0432\u043d\u043e\u0435 \u2014 \u0434\u043b\u044f \u0438\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432.\n\n\u0411\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c Palo Alto \u043f\u043e\u0441\u0432\u044f\u0449\u0451\u043d \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Palo Alto Networks Expedition, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 API-\u043a\u043b\u044e\u0447\u0438 \u043e\u0442 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 PAN-OS. \u0420\u0435\u0439\u0442\u0438\u043d\u0433 CVSS \u0434\u043b\u044f \u044d\u0442\u0438\u0445 CVE  \u0432\u0430\u0440\u044c\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043e\u0442 7 \u0434\u043e 9.9, \u043f\u043e\u0441\u043b\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u043e \u0441\u043c\u0435\u043d\u0438\u0442\u044c \u0432\u0441\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 API-\u043a\u043b\u044e\u0447\u0438. \u0421\u0430\u043c\u0438 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u044d\u043a\u0440\u0430\u043d\u044b \u0434\u0435\u0444\u0435\u043a\u0442\u0430\u043c\u0438 \u043d\u0435 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b. \u0415\u0441\u0442\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0438 PoC, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0432\u0438\u0434\u0438\u043c\u043e, \u043d\u0435 \u0437\u0430 \u0433\u043e\u0440\u0430\u043c\u0438.\n\n\u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c CISA \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430 \u043e \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2024-23113, \u044d\u0442\u043e RCE \u0432 FortiOS \u0441 CVSS 9.8, \u0437\u0430\u043a\u0440\u044b\u0442\u0430\u044f \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435 \u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u043d\u0430\u044f \u0432 \u0430\u043f\u0440\u0435\u043b\u0435. \u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b FortiOS, FortiPAM, FortiProxy \u0438 FortiWeb. \u0410\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u043c \u0433\u043e\u0441\u043e\u0440\u0433\u0430\u043d\u0430\u043c \u0432\u0435\u043b\u0435\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u0442\u0447\u0438 \u0438\u043b\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u043c\u0438\u0442\u0438\u0433\u0430\u0446\u0438\u0438 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0442\u0440\u0451\u0445 \u043d\u0435\u0434\u0435\u043b\u044c, \u0432\u0441\u0435\u043c \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u043c \u0442\u043e\u0436\u0435 \u0441\u0442\u043e\u0438\u0442 \u043f\u043e\u0442\u043e\u0440\u043e\u043f\u0438\u0442\u044c\u0441\u044f.\n\n\u041d\u0443 \u0430 Ivanti \u0441\u0442\u043e\u0439\u043a\u043e \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0438\u0434\u0442\u0438 \u043f\u0440\u0435\u0436\u043d\u0438\u043c \u043a\u0443\u0440\u0441\u043e\u043c, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0432 \u0432 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445, \u0442\u0440\u0438 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432 \u0441\u043e\u0447\u0435\u0442\u0430\u043d\u0438\u0438 \u0441 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u043c, \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u043c \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435, \u0441\u043d\u043e\u0432\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \n\u0420\u0435\u0447\u044c \u043f\u0440\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438  \u0432  Ivanti Cloud Services Application  (CVE-2024-9379, -9380, -9388 \u043f\u043b\u044e\u0441 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f CVE-2024-8963), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434. \u0412\u0435\u043d\u0434\u043e\u0440 \u043f\u043e\u0434\u0447\u0435\u0440\u043a\u0438\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u043d\u0430 \u043b\u0438\u043d\u0435\u0439\u043a\u0435 CSA 5.0 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u043e, \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0435\u0440\u0441\u0438\u0438 4.6.\n\u0420\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u043e \u0434\u043b\u044f \u0434\u0432\u0443\u0445 \u0434\u0440\u0443\u0433\u0438\u0445 \u043d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u044b\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u2014 CVE-2024-7612 \u0432 Ivanti Endpoint Manager Mobile  (\u043d\u0435\u043f\u0440\u0430\u0432\u043e\u043c\u0435\u0440\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438, CVSS 8.8) \u0438 CVE-2024-37404 \u0432 Ivanti Connect Secure / Policy Secure  (RCE, CVSS 9.1).\n\n\u0422\u0435, \u043a\u0442\u043e \u043d\u0435 \u0438\u043c\u043f\u043e\u0440\u0442\u043e\u0437\u0430\u043c\u0435\u0449\u0430\u0435\u0442\u0441\u044f \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u043c\u0438\u043d\u0443\u0442\u044b, \u0443\u0436\u0435 \u0431\u0435\u0433\u0443\u0442 \u0438\u0441\u043a\u0430\u0442\u044c \u0430\u043f\u0434\u0435\u0439\u0442\u044b.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-10-10T10:01:33.000000Z"}, {"uuid": "4787d309-92de-426e-826a-c23517770873", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/655", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113-Private-POC\nURL\uff1ahttps://github.com/hatvix1/CVE-2024-23113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-29T13:12:36.000000Z"}, {"uuid": "99e097d7-7798-413e-9e1f-38bbb73315bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13750", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024.\n\nhttps://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/", "creation_timestamp": "2024-10-15T05:18:43.000000Z"}, {"uuid": "0682ac29-7209-4cd1-9203-ce6a7f5166ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9210", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-23113 \u662f\u4e00\u4e2a\u5728 Linux Kernel \u4e2d\u88ab\u53d1\u73b0\u7684\u6f0f\u6d1e\uff0c\u5b83\u5c5e\u4e8e \u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u5f71\u54cd\u4e86 bpf (Berkeley Packet Filter) \u5b50\u7cfb\u7edf\u3002\u5177\u4f53\u6765\u8bf4\uff0c\u8fd9\u4e2a\u6f0f\u6d1e\u5f71\u54cd\u4e86 bpf \u7a0b\u5e8f\u7684 bpf_prog \u7c7b\u578b\u7684\u5bf9\u8c61\uff0c\u5e76\u4e14\u53ef\u4ee5\u5141\u8bb8\u653b\u51fb\u8005\u901a\u8fc7\u6784\u9020\u6076\u610f\u7684 BPF \u7a0b\u5e8f\u6765\u5728\u5185\u6838\u7a7a\u95f4\u6267\u884c\u6076\u610f\u4ee3\u7801\u3002\nURL\uff1ahttps://github.com/XiaomingX/CVE-2024-23113-poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-28T06:34:11.000000Z"}, {"uuid": "e7a52258-9583-4067-a248-130f004e51f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/ViralCyber/6999", "content": "\ud83d\udd34 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u06cc\u0634 \u0627\u0632 \u0668\u0667\u0660\u0660\u0660 \u062f\u0633\u062a\u06af\u0627\u0647 FortiOS \u062f\u0631 \u0628\u0631\u0627\u0628\u0631 \u062d\u0645\u0644\u0627\u062a \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631\n\n\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062d\u06cc\u0627\u062a\u06cc \u06a9\u0647 \u0628\u06cc\u0634 \u0627\u0632 \u0668\u0667\u0660\u0660\u0660 \u062f\u0633\u062a\u06af\u0627\u0647 FortiOS \u0631\u0627 \u062a\u062d\u062a \u062a\u0627\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0634\u0641 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0627\u06cc\u0646 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627 \u0631\u0627 \u062f\u0631 \u0645\u0639\u0631\u0636 \u062d\u0645\u0644\u0627\u062a \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (RCE) \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n\u0627\u06cc\u0646 \u0646\u0642\u0635 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 CVE-2024-23113\u060c \u0686\u0646\u062f\u06cc\u0646 \u0646\u0633\u062e\u0647 \u0627\u0632 FortiOS\u060c FortiProxy\u060c FortiPAM \u0648 FortiWeb \u0631\u0627 \u062a\u062d\u062a \u062a\u0627\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0632 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0633\u062a\u0631\u06cc\u0646\u06af \u0641\u0631\u0645\u062a \u06a9\u0646\u062a\u0631\u0644\u200c\u0634\u062f\u0647 \u062e\u0627\u0631\u062c\u06cc \u062f\u0631 FortiOS fgfmd daemon \u0646\u0627\u0634\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f \u06a9\u0647 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0631\u0627\u0647 \u062f\u0648\u0631 \u062a\u0627\u06cc\u06cc\u062f \u0646\u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u06cc\u0627 \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062f\u0631\u062e\u0648\u0627\u0633\u062a\u200c\u0647\u0627\u06cc \u0633\u0627\u062e\u062a\u0647\u200c\u0634\u062f\u0647 \u062e\u0627\u0635 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f.\n\n\u0637\u0628\u0642 \u0627\u0633\u06a9\u0646\u200c\u0647\u0627\u06cc Shadowserver\u060c \u062a\u0642\u0631\u06cc\u0628\u0627 87390 \u0622\u062f\u0631\u0633 IP \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u0628\u0627\u0644\u0642\u0648\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 Fortinet \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647\u200c\u0627\u0646\u062f. \u0627\u06cc\u0627\u0644\u0627\u062a \u0645\u062a\u062d\u062f\u0647 \u0628\u0627 14000 \u062f\u0633\u062a\u06af\u0627\u0647 \u0622\u0633\u06cc\u0628 \u062f\u06cc\u062f\u0647 \u067e\u06cc\u0634\u062a\u0627\u0632 \u0627\u0633\u062a \u0648 \u067e\u0633 \u0627\u0632 \u0622\u0646 \u0698\u0627\u067e\u0646 (5100) \u0648 \u0647\u0646\u062f (4800) \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u0646\u062f\u061b \u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u06cc\u0631\u0627\u0646 \u0646\u06cc\u0632 \u0627\u0632 \u0627\u06cc\u0646 \u0642\u0627\u0639\u062f\u0647 \u0645\u0633\u062a\u062b\u0646\u06cc \u0646\u06cc\u0633\u062a.\n\n#Cybersecurity #Cyber_Attack #FortiOS #RCE #Fortinet #FortiPAM #FortiProxy #FortiWeb #fgfmd #FortiManager #FortiGate #\u0627\u0645\u0646\u06cc\u062a_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u062d\u0645\u0644\u0647_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u0641\u0648\u0631\u062a\u06cc\u0646\u062a #\u0641\u0648\u0631\u062a\u06cc\u06af\u06cc\u062a\n\n\u0645\u0637\u0627\u0644\u0639\u0647 \u06a9\u0627\u0645\u0644 \u062e\u0628\u0631 \ud83d\udc49\n\n\ud83c\udd94 @Takianco\n\ud83c\uddee\ud83c\uddf7", "creation_timestamp": "2024-10-15T14:25:38.000000Z"}, {"uuid": "c5f93779-b002-42b8-9211-3a9ac0a4aa3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/128622", "content": "CHANNELS\n\nTOX ID SUPPORT 022A7EEB83B648F55DA7A6BEFD130C2156C74F3501A31D853234EC2D18E77A1EA9FCE8BF45DE\n\n( RansomHub \u0440\u0435\u0431\u0440\u0435\u043d\u0434\u0438\u043d\u0433 BlackCat, \u0431\u0443\u0434\u044c\u0442\u0435 \u0430\u043a\u043a\u0443\u0440\u0430\u0442\u043d\u044b )\n@LockBitSuppRaas", "creation_timestamp": "2024-10-12T22:23:27.000000Z"}, {"uuid": "74c0009c-0595-4062-97e2-ffa85d9a0202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/128621", "content": "", "creation_timestamp": "2024-10-12T22:23:27.000000Z"}, {"uuid": "4165cf6a-20a3-4eb4-a54b-d14c5a4b5c61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/891", "content": "CVE-2024-23113 Checker.", "creation_timestamp": "2024-10-10T17:52:35.000000Z"}, {"uuid": "38615774-8113-4a9f-80c0-5e3c68611b0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/Hunt3rkill3rs1/890", "content": "Just a light PoC \ud83d\ude02", "creation_timestamp": "2024-10-10T17:13:13.000000Z"}, {"uuid": "bef1faa9-0ca2-4048-a91a-d0993615db7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/Hunt3rkill3rs1/889", "content": "CVE-2024-23113 Exploited Successfully \ud83d\ude0e\n\nWait for us, Fortinet \ud83d\ude02", "creation_timestamp": "2024-10-10T16:57:11.000000Z"}, {"uuid": "48c98590-0fd8-4826-96b2-7dc22f3b367d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/MsaLXAecATEeSP3bIP2xsXsVfQMtECSF46FI3pHxvqNNPfiP", "content": "", "creation_timestamp": "2025-01-14T14:02:51.000000Z"}, {"uuid": "494e27b0-3991-4946-8f47-7a5d65591a85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/1_TySFnc1nz-kcXeJCXQZDYM9oo_28cD1m1Zwhw9cHHvjQY5", "content": "", "creation_timestamp": "2025-01-20T01:06:13.000000Z"}, {"uuid": "253678bc-039c-43dd-842e-c4e370b4cdc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/CEK7-PKupQfdk0SjOSRczbh1FS6zKSGNseKEfnfBgojb2z8x", "content": "", "creation_timestamp": "2025-03-03T15:22:22.000000Z"}, {"uuid": "e2846fb5-e4f5-4326-8fe4-7012400c049a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/DmehSKpdGyx3yTe3ZT_j9yARFkHsuQzPWdJDNDr7SkL5Qd9Y", "content": "", "creation_timestamp": "2025-03-02T08:20:14.000000Z"}, {"uuid": "e05e36f0-6cc0-4287-82c5-64b955988388", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/PG_WTmVtWU2POU_mhGwfN-V1phN9BSx-4YqzhAmMM69fo7D2", "content": "", "creation_timestamp": "2025-02-27T21:23:23.000000Z"}, {"uuid": "e1eca85d-5f71-4995-8f2b-d3459463c815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/QWlJobXWfZyefK779rL_JmZz7Vbm02kPR6Jk9dMHhvyTp3mG", "content": "", "creation_timestamp": "2024-11-24T09:45:28.000000Z"}, {"uuid": "79bcb458-24c1-46a6-9671-d2e6c24e80e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/d-bvCqKcgFEK__e1hOIxuXXmid2CuRo8nmLJtashTV_kTDVK", "content": "", "creation_timestamp": "2024-11-16T08:16:36.000000Z"}, {"uuid": "f8860eb2-d76c-47f2-96eb-78eb33b6a69b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/0WvBhCAXP1ofpgyT2ySJENQAj3jhM2_RMfmkhEqVoc2EOvLF", "content": "", "creation_timestamp": "2024-11-19T05:51:49.000000Z"}, {"uuid": "15f05532-ee76-4d26-a46d-39aa32165a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/ymlgOxuPXK6Ae_Lir6rqoySFS2RSA-yyzl1nwgdgzflMk5ZT", "content": "", "creation_timestamp": "2024-11-11T21:39:49.000000Z"}, {"uuid": "3ef9225b-5160-401e-9512-ed381d6c7ef4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/CS_KJ9CgkmiE6Ezf_V2vBiiuIi46OvR-W3l8Gty02i2PkbML", "content": "", "creation_timestamp": "2024-10-25T07:12:44.000000Z"}, {"uuid": "98938400-3bf9-4696-8a33-7bd138c0155b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/yo5eq1la3P-tfdwuZuJ4Sb6--BBixJnry-u_KBoUaeFoeVCS", "content": "", "creation_timestamp": "2024-10-25T07:12:44.000000Z"}, {"uuid": "4618f69d-b58f-4627-b74b-b5d8b21c9a57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/bAwQIpDT0bIzvIb69Z4mTwL4-Rbfx0GWjT4-wyQ_7IFr1Cc", "content": "", "creation_timestamp": "2024-10-12T22:23:18.000000Z"}, {"uuid": "1f33fd18-1fda-40c1-abe8-238e17727d53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/strKQnl6XITRRSJno38w6TopaImkE6v18oYI4dnhGsWQRhrR", "content": "", "creation_timestamp": "2024-12-25T21:02:03.000000Z"}, {"uuid": "7e3027b5-a534-4b98-9f6f-3bdeb5ca1f47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "Telegram/v7Diel1jEKhhIQanhK2Lz8w_QvkEpcY2Z2GOuR8bSip4ZA", "content": "", "creation_timestamp": "2024-10-10T11:20:41.000000Z"}, {"uuid": "107ed06b-eef0-4130-b35b-6d7147aa8139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/23296", "content": "The Hacker News\nCISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Fortinet products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nThe vulnerability, tracked as CVE-2024-23113 (CVSS score: 9.8), relates to cases of remote code execution that affects FortiOS, FortiPAM, FortiProxy, and FortiWeb.\n\"A", "creation_timestamp": "2024-10-10T10:23:58.000000Z"}, {"uuid": "f752cab1-cc06-4671-9eeb-ec3f141ed781", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/L_b1Xuj0our3a1ZqxBxYLK2myBV1m-ORB7vprZDz005sTRsB", "content": "", "creation_timestamp": "2025-01-20T01:06:09.000000Z"}, {"uuid": "20ff0b6d-72f9-47d9-9a3a-08df0a331592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/wYoe5N3CsqjMr2_CPLw5Bvozx9eXplKs_1JUyUp4h8xYD_g", "content": "", "creation_timestamp": "2024-10-12T22:23:20.000000Z"}, {"uuid": "0ffd86b2-c962-4525-b4d1-ac0e67e94bf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/CBNZrzqmsjfc3IPp7zmwl-B_LMxMooaPbYTpYe43Wmzk_UlF", "content": "", "creation_timestamp": "2024-11-19T05:51:45.000000Z"}, {"uuid": "1bfde437-6731-4fa7-bd11-e0993ee7959a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/Qz3QPsOOVdbSJ9FWpVd5WT3ielUxuX3CJ_uub9Md563O0SgP", "content": "", "creation_timestamp": "2024-11-16T08:16:32.000000Z"}, {"uuid": "4fd1aee4-9293-4513-82b8-b34b76504b50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/KfOc1AWAD39Ayerk8PX3DJaIsvVBQJIafEdvj54B-M0vn2U", "content": "", "creation_timestamp": "2024-10-12T22:23:20.000000Z"}, {"uuid": "4908e29c-316a-4f8f-ad97-f696302d117f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/AQEFDRwlxFAKZwBPrmFhdI9-mmuZNVQ9kpN4lp54hjzDQ1sZ", "content": "", "creation_timestamp": "2024-10-25T07:12:41.000000Z"}, {"uuid": "127c3dee-7105-42de-920a-1a67620dad80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/Mw6Mxm_XYAVD7IjT0FEYcfQgtTghvSGuRY6JkQbxc6gxKlVe", "content": "", "creation_timestamp": "2024-10-25T07:12:41.000000Z"}, {"uuid": "f215e85f-c363-496a-bfdb-34785a5ca0a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/mw8SQLlN6PeMEGHS7GHyyNpaadIhKbuXFGHUFbEBJG5g3LPh", "content": "", "creation_timestamp": "2024-11-24T09:45:22.000000Z"}, {"uuid": "a772c47a-e5fe-4933-9cf5-7c5065830a99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/vPGTpHMQaW-6QkByQ5ygtq8yqxGHUszBdLBP8jw2yhggb3Va", "content": "", "creation_timestamp": "2024-11-11T21:39:45.000000Z"}, {"uuid": "ca4f2a17-3499-4568-82f5-ff7eea74da19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/h6CzIWajF5rNNAOpz3X6tJZnaIiHX6SZWvRwLtrSQmMmi6-R", "content": "", "creation_timestamp": "2025-01-14T14:02:47.000000Z"}, {"uuid": "5c48a7d6-4303-4448-96cc-6a96d2a469c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/CyberSecurityIL/38653", "content": "\u05de\u05e2\u05e8\u05da \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05de\u05e4\u05e8\u05e1\u05dd \u05d4\u05d5\u05d3\u05e2\u05d4 \u05dc\u05e4\u05d9\u05d4 \u05db--30 \u05d0\u05dc\u05e3 \u05db\u05ea\u05d5\u05d1\u05d5\u05ea, \u05d4\u05de\u05e9\u05d5\u05d9\u05db\u05d5\u05ea \u05dc\u05d0\u05dc\u05e4\u05d9 \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d1\u05d9\u05e9\u05e8\u05d0\u05dc, \u05d7\u05e9\u05d5\u05e4\u05d5\u05ea \u05dc\u05de\u05ea\u05e7\u05e4\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05de\u05d9\u05d9\u05d3\u05d9\u05ea \u05d1\u05e9\u05dc \u05e9\u05ea\u05d9 \u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea \u05e9\u05d4\u05ea\u05d2\u05dc\u05d5 \u05d1\u05de\u05e2\u05e8\u05db\u05ea \u05d7\u05d9\u05d1\u05d5\u05e8 \u05de\u05e8\u05d7\u05d5\u05e7 (VPN) \u05de\u05ea\u05d5\u05e6\u05e8\u05ea \u05e4\u05d5\u05e8\u05d8\u05d9\u05e0\u05d8.\n\n\u05de\u05d3\u05d5\u05d1\u05e8 \u05d1\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05e9\u05e4\u05d5\u05e8\u05e1\u05de\u05d5 \u05d1-9.2.24:\n\nCVE-2024-23113\nCVE-2024-21762\n\n\u05d0\u05dc \u05ea\u05d7\u05db\u05d5 \u05e2\u05dd \u05d6\u05d4, \u05ea\u05e2\u05d3\u05db\u05e0\u05d5 \u05e2\u05db\u05e9\u05d9\u05d5. \u23f1\n\n\u05e8\u05d0\u05d9\u05ea\u05dd \u05de\u05d4 \u05e7\u05e8\u05d4 \u05dc\u05dc\u05d5\u05e7\u05d1\u05d9\u05d8 \u05e9\u05dc\u05d0 \u05e2\u05d9\u05d3\u05db\u05e0\u05d5 \u05d0\u05ea \u05d2\u05e8\u05e1\u05ea \u05d4-PHP \u05e9\u05dc\u05d4\u05dd \ud83d\ude09\n\nhttps://t.me/CyberSecurityIL/4681\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea #\u05d9\u05e9\u05e8\u05d0\u05dc", "creation_timestamp": "2024-02-22T11:12:47.000000Z"}, {"uuid": "350398d3-2f57-4a19-a964-3ffd5aff10fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/mTqXEyv8Pb9UCO1k_ZxjjXiRfrtbSnVJOLBPrCmi4wAHrv-r", "content": "", "creation_timestamp": "2025-03-03T15:22:23.000000Z"}, {"uuid": "60069502-ca05-4f61-8a57-e20ea9982f2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/ux4Zr-z4ECFI7xa5pBI5DnDKzfYX8Fq0hXoGAd6c_e_1sH1Z", "content": "", "creation_timestamp": "2025-03-02T08:20:10.000000Z"}, {"uuid": "94721301-0de5-4dec-b034-aa52dc13a482", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/npUGSI6L8vlLkQsbOryfU4Uio-VBoFGPgEg04rTg4t4yNW9i", "content": "", "creation_timestamp": "2025-02-27T21:23:25.000000Z"}, {"uuid": "2bbd09c1-7545-49a1-a907-70ff2e46aa39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "Telegram/Bw4k0sSuQKGk-LMUlz8E8QcYJV2MftkDjkwJUO0f-MtoZUgp", "content": "", "creation_timestamp": "2024-12-25T21:01:59.000000Z"}, {"uuid": "895e0fb8-1b94-4cba-aa56-cf7371054eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/lcmysecteamch/10473", "content": "Fortimanager Unauthenticated Remote Code Execution AKA fortijump CVE-2024-47575\n\nPOC for CVSS 9.8 vulnerability in FortiManager, their tool for central management of FortiGate appliances.\n\nBlog: https://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n#1N73LL1G3NC3 #fortinet\n\n@freedomf0x", "creation_timestamp": "2024-11-15T03:55:46.000000Z"}, {"uuid": "41d4daec-3888-4a70-9493-5748376e6721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/lcmysecteamch/10156", "content": "Fortimanager Unauthenticated Remote Code Execution AKA fortijump CVE-2024-47575\n\nPOC for CVSS 9.8 vulnerability in FortiManager, their tool for central management of FortiGate appliances.\n\nBlog: https://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n#1N73LL1G3NC3 #fortinet\n\n@freedomf0x", "creation_timestamp": "2024-11-15T03:55:46.000000Z"}, {"uuid": "5fb32496-06a5-4add-b742-0f2034b35067", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/5064", "content": "The Hacker News\nCISA Warns of Critical Fortinet Flaw as Palo Alto and Cisco Issue Urgent Security Patches\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Fortinet products to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nThe vulnerability, tracked as CVE-2024-23113 (CVSS score: 9.8), relates to cases of remote code execution that affects FortiOS, FortiPAM, FortiProxy, and FortiWeb.\n\"A", "creation_timestamp": "2024-10-10T10:23:58.000000Z"}, {"uuid": "92f6a144-73c6-452e-bf64-e297b517a285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/cybersecs/3322", "content": "\ud83d\udea8 Fortinet FortiManager Unauthenticated RCE (CVE-2024-47575)\n\nThe remote code execution vulnerability in FortiManager allows attackers to perform arbitrary operations by exploiting commands via the FGFM protocol, circumventing authentication. Referred to as FortiJump, this vulnerability provides unauthorized access to FortiManager, enabling control over FortiGate devices by taking advantage of insufficient security in command handling and device registration processes. \n\n\ud83d\udee0 Affected Versions:\nFortiManager 7.6.0\nFortiManager 7.4.0 through 7.4.4\nFortiManager 7.2.0 through 7.2.7\nFortiManager 7.0.0 through 7.0.12\nFortiManager 6.4.0 through 6.4.14\nFortiManager 6.2.0 through 6.2.12\nFortiManager Cloud 7.4.1 through 7.4.4\nFortiManager Cloud 7.2.1 through 7.2.7\nFortiManager Cloud 7.0.1 through 7.0.12\nFortiManager Cloud 6.4\n\n\ud83d\udd17 Research: \nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n\ud83d\udd17 Source: \nhttps://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\n\n#fortinet #fortimanager #fgfm #unauth #rce", "creation_timestamp": "2024-11-28T18:35:25.000000Z"}, {"uuid": "0256f7fb-b5c0-4df7-ba22-c2468d3a8f3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1552", "content": "\ud83d\udea8 Fortinet FortiManager Unauthenticated RCE (CVE-2024-47575)\n\nThe remote code execution vulnerability in FortiManager allows attackers to perform arbitrary operations by exploiting commands via the FGFM protocol, circumventing authentication. Referred to as FortiJump, this vulnerability provides unauthorized access to FortiManager, enabling control over FortiGate devices by taking advantage of insufficient security in command handling and device registration processes. \n\n\ud83d\udee0 Affected Versions:\nFortiManager 7.6.0\nFortiManager 7.4.0 through 7.4.4\nFortiManager 7.2.0 through 7.2.7\nFortiManager 7.0.0 through 7.0.12\nFortiManager 6.4.0 through 6.4.14\nFortiManager 6.2.0 through 6.2.12\nFortiManager Cloud 7.4.1 through 7.4.4\nFortiManager Cloud 7.2.1 through 7.2.7\nFortiManager Cloud 7.0.1 through 7.0.12\nFortiManager Cloud 6.4\n\n\ud83d\udd17 Research: \nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n\ud83d\udd17 Source: \nhttps://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\n\n#fortinet #fortimanager #fgfm #unauth #rce", "creation_timestamp": "2024-11-15T07:09:37.000000Z"}, {"uuid": "f241f2e1-a43d-4d17-9c0f-6bfc64ded49c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/true_secator/5396", "content": "Fortinet \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u043d\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 FortiOS SSL VPN, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\nCVE-2024-21762 (FG-IR-24-015) \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 CVSS 9,6 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u043f\u0438\u0441\u0438 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0433\u0440\u0430\u043d\u0438\u0446 \u0432 FortiOS.\n\n\u041e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u044b.\n\n\u0414\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043e\u0448\u0438\u0431\u043a\u0438, Fortinet \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u0439, \u0430 \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0435\u0441\u043b\u0438 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435 \u0443\u0434\u0430\u0435\u0442\u0441\u044f - \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043c\u043e\u0436\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c, \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0432 SSL VPN \u043d\u0430 \u0441\u0432\u043e\u0438\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0441 FortiOS.\n\n\u0427\u0442\u043e \u0436\u0435 \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, Fortinet \u043d\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439, \u0440\u0430\u0432\u043d\u043e \u0438 \u0442\u043e\u043c, \u043a\u0442\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c.\n\n\u0418\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043b\u0438\u0448\u044c \u0442\u043e, \u0447\u0442\u043e \u043e\u0434\u043d\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043d\u0430\u0440\u044f\u0434\u0443 \u0441 \u043d\u0435\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0440\u0430\u0441\u043a\u0440\u044b\u043b \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0438 \u043f\u043e \u0434\u0440\u0443\u0433\u0438\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445: CVE-2024-23113 (\u0440\u0435\u0439\u0442\u0438\u043d\u0433 9,8), CVE-2023-44487 \u0438 CVE-2023-47537 (\u043e\u0431\u0435 \u0441\u043e \u0441\u0440\u0435\u0434\u043d\u0438\u043c \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u043e\u043c). \u041e\u0434\u043d\u0430\u043a\u043e \u0438\u0445 \u043d\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438 \u043a\u0430\u043a \u0440\u0435\u0430\u043b\u044c\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0432 \u0432\u0438\u0434\u0443 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0438 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f CVE-2024-21762 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430.", "creation_timestamp": "2024-02-09T11:20:05.000000Z"}, {"uuid": "719e7732-620c-41ad-91df-687184475abe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/true_secator/5504", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Shadowserver \u0434\u0430\u044e\u0442 \u043d\u0435\u0443\u0442\u0435\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0443, \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043e\u043a\u043e\u043b\u043e 150 000 \u0432\u0435\u0431-\u0448\u043b\u044e\u0437\u043e\u0432 Fortinet FortiOS \u0438 FortiProxy \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 CVE-2024-21762, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u0431\u043e\u043b\u0435\u0435 24 000 - \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u0432 \u0421\u0428\u0410, \u0437\u0430 \u043d\u0438\u043c\u0438 \u0441\u043b\u0435\u0434\u0443\u044e\u0442 \u0418\u043d\u0434\u0438\u044f, \u0411\u0440\u0430\u0437\u0438\u043b\u0438\u044f \u0438 \u041a\u0430\u043d\u0430\u0434\u0430. \n\n\u0418 \u0432\u0441\u0435 \u044d\u0442\u043e \u043f\u0440\u0438 \u0442\u043e\u043c, \u0447\u0442\u043e \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0430\u044f CISA \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0438 \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0430 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u0432\u043e\u0439 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (KEV), \u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0441 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u043c\u0435\u0441\u044f\u0446\u0430.\n\n\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f CVE-2024-21762 (CVSS 9,8, \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e NIST), \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0432 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043c\u0430\u0448\u0438\u043d\u044b.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e \u0442\u043e\u043c, \u043a\u0442\u043e \u0438 \u043a\u0430\u043a \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432 \u0441\u0432\u043e\u0438\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f\u0445, \u0432 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u044b \u0438, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0431\u043e\u043b\u0435\u0435 \u0438\u0437\u043e\u0449\u0440\u0435\u043d\u043d\u044b\u043c\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438.\n\n\u0413\u043b\u0443\u0431\u043e\u043a\u043e \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0432\u0448\u0430\u044f \u043a\u043e\u0440\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u0438\u0447\u0438\u043d\u044b \u0434\u0432\u0443\u0445 \u043d\u0435\u0434\u0430\u0432\u043d\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043f\u043e\u043c\u0438\u043c\u043e \u043d\u0430\u0437\u0432\u0430\u043d\u043d\u043e\u0439 \u0438 CVE-2024-23113, BishopFox \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u043c Python \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438, \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043b\u0438 \u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u044b SSL VPN.\n\n\u041d\u043e, \u043f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u043d\u0430\u0447\u0430\u0432\u0448\u0443\u044e\u0441\u044f \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043c\u0443\u0434\u0430\u043a\u043e\u0432 \u0443\u0436\u0435 \u0432\u0440\u044f\u0434 \u043b\u0438 \u043e\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c. \u0411\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c.", "creation_timestamp": "2024-03-11T12:01:50.000000Z"}, {"uuid": "91ffcb4f-8406-4850-aa3a-1e5340045c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6304", "content": "\u0422\u0435\u043f\u0435\u0440\u044c \u043e \u0433\u0440\u0443\u0441\u0442\u043d\u043e\u043c, \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Fortinet RCE \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0420\u0435\u0447\u044c \u0438\u0434\u0435\u0442 \u043e CVE-2024-23113, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u0442\u0435\u043c, \u0447\u0442\u043e \u0434\u0435\u043c\u043e\u043d fgfmd \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u0435\u0442 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u0430 \u0441\u0442\u0440\u043e\u043a\u0443 \u0444\u043e\u0440\u043c\u0430\u0442\u0430, \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u0443\u044e \u0438\u0437\u0432\u043d\u0435, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438\u043b\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u043d\u0435\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u041a\u0430\u043a \u043f\u043e\u044f\u0441\u043d\u044f\u0435\u0442 Fortinet, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u0434\u0435\u043c\u043e\u043d fgfmd \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 FortiGate \u0438 FortiManager, \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044f \u0432\u0441\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u043c\u0435\u0436\u0434\u0443 \u043d\u0438\u043c\u0438.\n\nCVE-2024-23113\u00a0\u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 FortiOS 7.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, FortiPAM 1.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, FortiProxy 7.0 \u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 FortiWeb 7.4.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0435\u0449\u0435 \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435, \u043f\u043e\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u0432 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0437\u0430\u043a\u0440\u044b\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0434\u0435\u043c\u043e\u043d\u0443 fgfmd \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u043e\u0432 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439, \u043f\u0440\u0438\u0437\u0432\u0430\u043d\u043d\u043e\u0439 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c Fortinet \u0434\u043e \u0441\u0438\u0445 \u043f\u043e\u0440 \u043d\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0430 \u0441\u0432\u043e\u0438 \u0444\u0435\u0432\u0440\u0430\u043b\u044c\u0441\u043a\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0447\u0430\u0441\u0442\u0438 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2024-23113, \u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0441\u0432\u043e\u0438\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0432 \u043d\u0435\u0432\u0435\u0434\u0435\u043d\u0438\u0438.\n\n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u0438 \u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430 Palo Alto Networks, \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u043e\u0431\u044a\u0435\u0434\u0438\u043d\u0435\u043d\u044b \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u0437\u043b\u043e\u043c\u0430\u0442\u044c \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u044d\u043a\u0440\u0430\u043d\u044b PAN-OS. \u0421\u0440\u0435\u0434\u0438 \u043d\u0438\u0445:\n\n- CVE-2024-9463\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434)\n- CVE-2024-9464\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434)\n- CVE-2024-9465\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 SQL-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438)\n- CVE-2024-9466\u00a0(\u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0445\u0440\u0430\u043d\u044f\u0442\u0441\u044f \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435 \u0432 \u0436\u0443\u0440\u043d\u0430\u043b\u0430\u0445)\n- CVE-2024-9467\u00a0(\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c XSS \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438)\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u0438 Expedition. \u0418\u0445 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c (\u0438\u043c\u0435\u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043f\u0430\u0440\u043e\u043b\u0438, \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438 \u043a\u043b\u044e\u0447\u0438 API \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u0432 PAN-OS), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0435 \u0443\u0442\u0435\u0447\u043a\u0438.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Horizon3.ai, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0435 \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u0432\u0448\u0438\u0435 \u043e \u0447\u0435\u0442\u044b\u0440\u0435\u0445 \u043e\u0448\u0438\u0431\u043a\u0430\u0445, \u0443\u0436\u0435 \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u043e\u0442\u0447\u0435\u0442, \u0430 Hanley - PoC, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u044e\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0431\u0440\u043e\u0441\u0430 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 CVE-2024-5910 \u0441 CVE-2024-9464 \u0434\u043b\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 Expedition.\n\n\u0412 Palo Alto Networks \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u043d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u043d\u0435\u0442 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0434\u043b\u044f \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a. \u041d\u043e \u044d\u0442\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u043a\u0430.\n\n\u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 Expedition \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u0432\u0441\u0435 \u0438\u043c\u0435\u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 \u043a\u043b\u044e\u0447\u0438 API, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0434\u043b\u044f \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430.\n\n\u0410\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0442\u0438 Expedition \u0434\u043b\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0445\u043e\u0441\u0442\u043e\u0432 \u0438\u043b\u0438 \u0441\u0435\u0442\u0435\u0439.", "creation_timestamp": "2024-10-10T13:17:11.000000Z"}, {"uuid": "6529e094-6c67-46f6-9edf-cea6d9fddb2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "exploited", "source": "https://t.me/thehackernews/5713", "content": "\u26a0\ufe0f Cyber Alerts: \n \n\u2014Fortinet CVE-2024-23113 actively exploited, patch by Oct 30! \n\u2014Palo Alto Expedition vulnerable to SQL &amp; OS injection. \n\u2014Cisco patches critical bug in Nexus Dashboard Fabric Controller. \n \nRead: https://thehackernews.com/2024/10/cisa-warns-of-critical-fortinet-flaw-as.html \n \nCritical systems must be patched immediately.", "creation_timestamp": "2024-10-10T08:11:45.000000Z"}, {"uuid": "13a300fa-94aa-4dd4-8fd4-7c499535117a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/ctinow/204053", "content": "https://ift.tt/7OdCGz0\nCVE-2024-23113 Exploit", "creation_timestamp": "2024-03-09T20:16:47.000000Z"}, {"uuid": "c114e9ff-3d08-4b43-8112-13dd378bd94b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/ctinow/198405", "content": "https://ift.tt/qLOT2V5\nCVE-2024-23113 | Fortinet FortiOS up to 7.0.13/7.2.6/7.4.2 fgfmd format string (FG-IR-24-029)", "creation_timestamp": "2024-03-02T16:11:49.000000Z"}, {"uuid": "7663dfc5-fd08-4d42-9e7c-8c8d8b2d641f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "https://t.me/ctinow/185617", "content": "https://ift.tt/MzbVn1E\nCVE-2024-23113", "creation_timestamp": "2024-02-15T15:31:44.000000Z"}, {"uuid": "faabb1fc-686f-4ef7-a7a4-d7d1b999c87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3320", "content": "https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/\n\nFortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024\n#\u5206\u6790", "creation_timestamp": "2024-10-15T16:56:03.000000Z"}, {"uuid": "d369b2eb-e9d4-475d-a094-a0ee7b126a9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9327", "content": "Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575\n\nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/", "creation_timestamp": "2024-11-15T08:45:15.000000Z"}, {"uuid": "2be3ab01-bcd5-4fe3-95ae-9162605b0fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11287", "content": "#AppSec\n#Threat_Research\n1. New Supply Chain Attack Technique Can Trojanize All Your CLI Commands\nhttps://checkmarx.com/blog/this-new-supply-chain-attack-technique-can-trojanize-all-your-cli-commands\n2. Fortinet FortiGate CVE-2024-23113 -\nA Super Complex Vulnerability In A Super Secure Appliance In 2024\nhttps://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/\n]-&gt; PoC: https://github.com/CheckCve2/CVE-2024-23113", "creation_timestamp": "2024-10-15T14:13:43.000000Z"}, {"uuid": "8450e04c-f129-47da-8f04-a6431462c445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/suboxone_chatroom/2609", "content": "\ud83d\udea8 Fortinet FortiManager Unauthenticated RCE (CVE-2024-47575)\n\nThe remote code execution vulnerability in FortiManager allows attackers to perform arbitrary operations by exploiting commands via the FGFM protocol, circumventing authentication. Referred to as FortiJump, this vulnerability provides unauthorized access to FortiManager, enabling control over FortiGate devices by taking advantage of insufficient security in command handling and device registration processes. \n\n\ud83d\udee0 Affected Versions:\nFortiManager 7.6.0\nFortiManager 7.4.0 through 7.4.4\nFortiManager 7.2.0 through 7.2.7\nFortiManager 7.0.0 through 7.0.12\nFortiManager 6.4.0 through 6.4.14\nFortiManager 6.2.0 through 6.2.12\nFortiManager Cloud 7.4.1 through 7.4.4\nFortiManager Cloud 7.2.1 through 7.2.7\nFortiManager Cloud 7.0.1 through 7.0.12\nFortiManager Cloud 6.4\n\n\ud83d\udd17 Research: \nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\n\n\ud83d\udd17 Source: \nhttps://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\n\n#fortinet #fortimanager #fgfm #unauth #rce", "creation_timestamp": "2025-02-15T16:51:49.000000Z"}, {"uuid": "5b641063-7527-4cfe-b161-e3af0d1cbbba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "seen", "source": "Telegram/SaJKXt8OQhzDEe-5dugR50HuxezmSEkm7LMZtSRK2zCA", "content": "", "creation_timestamp": "2024-10-16T04:26:58.000000Z"}, {"uuid": "40c6bde6-29d7-48fd-9623-67a77cd2e972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-23113", "type": "published-proof-of-concept", "source": "https://t.me/HackerInvestigationZone/32", "content": "\ud83d\udea8 Fortinet FortiManager Unauthenticated RCE (CVE-2024-47575)\nThe remote code execution vulnerability in FortiManager allows attackers to perform arbitrary operations by exploiting commands via the FGFM protocol circumventing authentication Referred to as FortiJump this vulnerability provides unauthorized access to FortiManager enabling control over FortiGate devices by taking advantage of insufficient security in command handling and device registration processes\n\u2699\ufe0f Affected Versions:\nFortiManager 7.6.0\nFortiManager 7.4.0 through 7.4.4\nFortiManager 7.2.0 through 7.2.7\nFortiManager 7.0.0 through 7.0.12\nFortiManager 6.4.0 through 6.4.14\nFortiManager 6.2.0 through 6.2.12\nFortiManager Cloud 7.4.1 through 7.4.4\nFortiManager Cloud 7.2.1 through 7.2.7\nFortiManager Cloud 7.0.1 through 7.0.12\nFortiManager Cloud 6.4\nResearch: \nhttps://labs.watchtowr.com/hop-skip-fortijump-fortijumphigher-cve-2024-23113-cve-2024-47575/\nSource: \nhttps://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\n\n#Investigation_of_hacking", "creation_timestamp": "2024-11-15T15:06:06.000000Z"}]}