Alert
Number: AL25-005
Date: April 14, 2025
Audience
This Alert is intended for IT professionals and managers of notified organizations.
Purpose
An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.
Details
On April 10, 2025, Fortinet released a PSIRT blogFootnote 1 describing widespread exploitation of vulnerabilities in Fortinet FortiOS products going back to 2023. Threat actors have compromised vulnerable devices and maintained persistence even after patches were applied, potentially accessing sensitive files including credentials and key material.
CVE-2022-42475Footnote 2, CVE-2023-27997Footnote 3 and CVE-2024-21762Footnote 4 are all previous CVEs that have been exploited through this malicious activity. CCCS had published respective advisories for each one of them.
The following Fortinet products are affected by this vulnerability:
- FortiOS – versions 7.4, 7.2, 7.0 and 6.4
Note that customers who have not enabled SSL-VPN are not impacted by this vulnerability.
Suggested Actions
The Cyber Centre strongly recommends that organizations patch their FortiOS to the following versions:
- FortiOS – versions 7.6.2, 7.4.7, 7.2.11 & 7.0.17 or 6.4.16
It is imperative for organizations to identify and prioritize the patching of vulnerable systems promptly, using the following links:
- Fortinet PSIRT Advisory (FG-IR-22-398)
- Fortinet PSIRT Advisory (FG-IR-23-097)
- Fortinet PSIRT Advisory (FG-IR-24-015)
Recommendations:
- Reset credentials: Assume compromiseFootnote 5 and reset all credentials associated with SSL-VPN functionality, affected devices, user accounts, LDAP bind credentials, and pre-shared keys.
- Apply updates: Apply the latest updates to remove the malicious file and enable automatic updates for OS and AV/IPS.
- Review and monitor: Review the vendor advisory Footnote 1. Review logging for unauthorized SSL VPN access, including configurations for any unauthorized changes, and review network logging for known indicators of compromise.
- Disable or limit access: Disable SSL-VPN functionality if not required, limit access to trusted IP ranges, and disable administrative access to any external (Internet-facing) interface.
The Cyber Centre recommends that organizations:
- Assess the installations of the affected Fortinet products and monitor for signs of exploitation.
- Apply software patches to affected Fortinet products as soon as they become available.
In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre's Top 10 IT Security Actions Footnote 6 with an emphasis on the following strategies:
- Consolidate, monitor, and defend Internet gateways.
- Patch operating systems and applications.
- Isolate web-facing applications.
If activity matching the content of this alert is discovered, recipients are encouraged to report via the My Cyber Portal, or email contact@cyber.gc.ca.
Partner Reporting
- NCSC NZ – CVEs affecting Fortinet FortiOS products
- CERT NZ – Malicious activity due to previously exploited vulnerabilities in Fortinet FortiOS products
- CISA – Fortinet releases advisory on new post-exploitation technique for known vulnerabilities
About The Cyber Centre
The Canadian Centre for Cyber Security (Cyber Centre) operates as part of the Communications Security Establishment. We are Canada's national authority on cyber security, and we lead the government's response to cyber security events. As Canada's national computer security incident response team, the Cyber Centre works in close collaboration with government departments, critical infrastructure, Canadian businesses, and international partners to prepare for, respond to, mitigate, and recover from cyber events. We do this by providing authoritative advice and support and coordinating information sharing and incident response. The Cyber Centre is outward-facing, welcoming partnerships that help build a stronger, more resilient cyber space in Canada.