Back to all articles

Security Advisory: Hardening Management Interfaces Against Active CVE-2024-47575 and Edge Risks

Analysis of the critical zero-day vulnerability in Fortinet’s FortiManager and concurrent risks in SonicWall and Cisco environments. This advisory provides technical details and immediate steps to secure administrative planes and identity perimeters.

Triage Security Media Team
4 min read

Recent telemetry indicates a shift in how threat actors target the enterprise perimeter, with a specific focus on the management tools security teams use to maintain their defenses. The most significant finding involves a critical zero-day vulnerability in Fortinet’s FortiManager, identified as CVE-2024-47575. This flaw allows unauthorized parties to target the administrative plane of the enterprise network. When the platforms designed to orchestrate security policy are compromised, the risk extends to connected firewalls and internal segments.

This activity aligns with a broader trend where threat actors bypass individual workstations to focus on high-value infrastructure, such as VPNs and management consoles. Alongside the Fortinet disclosure, we are monitoring reports of ransomware groups leveraging a recent SonicWall vulnerability (CVE-2024-40766) and Cisco addressing denial-of-service flaws in its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) products. These developments suggest the defensive perimeter is experiencing multi-vector stress. Whether through the sophisticated use of a zero-day or automated authentication attempts against VPN gateways, the objective is consistent: establishing a foothold where detection is difficult and lateral movement is possible.

Technical Analysis: FortiManager Vulnerability

The vulnerability in FortiManager (CVE-2024-47575) presents specific risks for distributed networks. The flaw resides within the FortiGate to FortiManager (FGFM) protocol, specifically the fgfm daemon. It allows an unauthenticated remote actor to execute arbitrary code or commands by sending specially crafted requests to the management interface.

Researchers at Mandiant track this activity under the cluster UNC5820. They have observed unauthorized parties using this access to exfiltrate configuration files from managed devices. These files typically contain sensitive metadata, routing information, and hashed credentials, which can assist in planning subsequent intrusion stages.

Edge Security: SonicWall and Cisco

In parallel, the active use of vulnerabilities in SonicWall devices demonstrates how quickly edge footholds can impact the enterprise. Ransomware groups, including Akira and Fog, are leveraging CVE-2024-40766 to obtain initial access. In many cases, this involves bypassing secondary authentication where it is not strictly enforced. Observations indicate that threat actors can move from the VPN gateway to internal domain controllers within hours.

Cisco’s recently disclosed vulnerability, CVE-2024-20481, presents a risk of resource exhaustion. By flooding the Remote Access VPN (RAVPN) service with a high volume of authentication requests, unauthorized parties can trigger a denial-of-service state. This effectively prevents legitimate employee access and may obscure other simultaneous unauthorized activities including security monitoring.

Identity Threats: RDP Configuration Risks

The identity field is further complicated by a spear-phishing campaign attributed and the state-sponsored actor APT29 (Midnight Blizzard). This campaign utilizes modified RDP configuration files rather than traditional malware. When a user opens these files, they connect to a server controlled by the threat actor. The risk stems from the RDP settings, which are configured to map the user’s local drives and printers to the remote server. This configuration allows the unauthorized party to access the local machine, retrieve data, or establish persistence without triggering standard antivirus signatures.

Remediation and Hardening Guidance

For security teams, the immediate priority is hardening management interfaces and identity barriers.

FortiManager Response Organizations running FortiManager should verify their deployment against the fixed releases: versions 7.0.13, 7.2.5, 7.4.3, and 7.6.1 or later.

  • Mitigation: If immediate patching is not feasible, Fortinet recommends disabling the FGFM feature on susceptible interfaces or implementing a local-in policy to whitelist only the IP addresses of authorized FortiGate devices.

  • Detection: Scan FortiManager logs for indicators of compromise. Look for log entries where the "msg" field includes "Remote log forwarding" associated with unknown serial numbers, or the presence of unexpected files in the /tmp/.X11-unix/ directory.

Identity and Access Management

  • MFA Enforcement: For SonicWall and Cisco environments, multi-factor authentication (MFA) must be enforced across all VPN accounts to mitigate the risk of ransomware deployment.

  • Rate Limiting: Implement rate limiting on VPN gateways to protect against the resource exhaustion methods described in the Cisco advisory.

  • RDP Security: To counter RDP-based phishing, organizations should consider using Group Policy Objects (GPOs) to restrict the redirection of local resources to untrusted RDP servers. User education regarding the risks of opening external configuration files is also recommended.

Strategic Outlook

We anticipate a continued focus on centralized management platforms. As security architectures become more automated, these central nodes represent efficient targets for threat actors. The transition from compromising a single device to accessing the platform that manages the fleet requires defenders to adjust their strategy. Management platforms should be treated with the same scrutiny and "zero trust" principles applied to sensitive databases or identity providers.

Visibility into the full extent of the FortiManager zero-day usage prior to public disclosure remains limited. While Mandiant identified specific activity, the timeline suggests other actors may have also leveraged the flaw. Similarly, the scope of data exfiltration in the SonicWall and Cisco cases is not yet fully defined. Until further analysis confirms the safety of the environment, security teams should operate under the assumption that recent unauthorized access may have impacted the integrity of stored credentials.