CVE-2023-27997

Vulnerability updated 3 days ago (2024-11-21T10:31:43.440Z)
Download STIX
Preview STIX
CVE-2023-27997 is a critical vulnerability (with a CVSS score of 9.2) in FortiOS and FortiProxy, which could lead to remote code execution (RCE). This flaw, discovered in the software design or implementation, was reportedly exploited by Volt Typhoon, a state-sponsored actor based in China, as part of their LODEINFO Campaign #2 in 2023. The exploit was also found being used against other enterprise products such as Array AG (CVE-2023-28461) and Proself (CVE-2023-45727), highlighting a trend of these vulnerabilities being abused in the wild. Earlier in the month, Fortinet acknowledged that CVE-2023-27997 may have been abused in limited attacks targeting government, manufacturing, and critical infrastructure sectors. A subsequent scan of public internet-exposed Fortinet FortiOS and FortiProxy SSL-VPNs interfaces by Bishop Fox security researchers revealed that 69% of the total 490,000 interfaces scanned were vulnerable to this RCE vulnerability. Over 300,000 Fortinet firewalls were found to be at risk due to this vulnerability, adding to the concerns for Fortinet users. Despite Fortinet releasing security updates to patch the issue, more than 300,000 of FortiGate firewalls still remain unpatched against this critical remote execution flaw almost a month after the update. Among the 489,337 devices discovered by the query, there were varying degrees of vulnerability to CVE-2023-27997, known as Xortigate. Check Point IPS provides protection against this threat, however, the continued active exploitation of this vulnerability necessitates urgent attention and remediation from all Fortinet users.
Description last updated: 2024-11-21T10:28:40.621Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Fortinet
Exploit
Fortigate
Fortios
exploited
Vpn
Fortiproxy
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Volt Typhoon Threat Actor is associated with CVE-2023-27997. Volt Typhoon, a cyberespionage cluster sponsored by China, has emerged as a significant threat actor in the cybersecurity landscape. Known for its strong operational security and obfuscation of malware, Volt Typhoon is both a resilient botnet and a warning signal of potential critical infrastructureUnspecified
4
Source Document References
Information about the CVE-2023-27997 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Trend Micro
3 days ago
CISA
8 days ago
CISA
3 months ago
CISA
4 months ago
Recorded Future
7 months ago
DARKReading
8 months ago
SANS ISC
8 months ago
CISA
8 months ago
DARKReading
8 months ago
Recorded Future
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Checkpoint
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago