Configs Leaked.rar -
: Investigations suggest the data was likely stolen in late 2022 . The leak is believed to be the result of attackers exploiting a specific authentication bypass vulnerability, CVE-2022-40684 , which allowed administrative access to affected FortiOS, FortiProxy, and FortiSwitchManager products.
So the data was probably stolen in the fall of 2022, but where and how did the unknown attackers obtain the sensitive information? heise online
: Ensure your firmware is updated to versions that patch CVE-2022-40684 . Configs Leaked.rar
: Because these configuration files are not typically stored centrally by the manufacturer, security experts believe the leak originated from individual firewall exploits rather than a breach of Fortinet's own systems. Response and Remediation
: Examine your firewall logs for any unauthorized administrative access dating back to late 2022. : Investigations suggest the data was likely stolen
Security researchers and community members on platforms like Reddit have been mapping the leaked IPs to identify affected organizations. If you are an administrator of a FortiGate device:
: Immediately change all administrative and VPN passwords. heise online : Ensure your firmware is updated
: The .rar archive reportedly includes sensitive information such as: IP addresses and port details. Firewall configuration settings. Hashed or plain-text VPN passwords.
