Open for Public Comment | Developing Security, Privacy, and Cybersecurity Supply Chain Risk Management Plans for Systems

NIST invites comments on the initial public draft (ipd) of Special Publication (SP) 800-18r2 (Revision 2), Developing Security, Privacy, and Cybersecurity Supply Chain Risk Management Plans for Systems.

The system security plan, privacy plan, and cybersecurity supply chain risk management plan consolidate information about the assets and individuals being protected within an authorization boundary and its interconnected systems. These system plans serve as a centralized point of reference for information about the system and risk management decisions, including data being created, collected, disseminated, used, stored, and disposed of; the individuals responsible for system risk management efforts; details about the internal and external environments of operation, system components, and data flows; and controls that are planned or in place to manage risks.

The major changes for this revision include:

Additionally, the following supplemental materials are available:

  • Security Plan Example Outline
  • Privacy Plan Example Outline
  • C-SCRM Plan Example Outline
  • System Plan Related Roles and Responsibilities

The comment period is open through July 30, 2025. See the publication details for a copy of the draft, supplemental files, and a comment template. Commenters are encouraged to use that template and submit feedback to sec-cert@nist.gov with “SP 800-18r2 ipd comments” in the subject.

Read More

Malware Prevention, Discovery, and Recovery Training Course

June 4, 2025  
NJCCIC Public/Private Sector IT-Security Professional Members, 
    The Cybersecurity and Infrastructure Security Agency (CISA), Region 2, in coordination with the National Cybersecurity Preparedness Consortium (NCPC), is sponsoring a four-day Malware Prevention, Discovery, and Recovery (MPDR) training course.

The course is being offered at no cost to you or your organization. The in-person training course will be held Tuesday, August 19, through Friday, August 22, at Kean University.  

Course Description MPDR aims to provide technical personnel with the hands-on expertise necessary to prevent, discover, recognize, and recover from modern malware, which is often a fundamental element of many computer network breaches and data theft incidents. MPDR will expose participants to analysis of malicious software used by cybercriminals and cyber-terrorists. After an introduction to modern malware, participants will learn how to prevent a malware outbreak, discover and identify malware through active network traffic analysis, prepare for dynamic analysis of malware samples of various types and intent, and how to isolate, remediate, and recover from a malware outbreak. The course will conclude with a review of dynamic malware analysis and a look at emerging trends in using malicious software in network intrusions and data theft.  
Prerequisites Participants should have some experience as a cybersecurity professional and a good understanding of network concepts, and computer operating systems. Two years’ experience as a system or network administrator, or as an IT security specialist is preferred.  

Registration Space is extremely limited, and registration is required. You must register using your agency/organization email address. Personal email addresses will not be considered. Additionally, you will be required to attend all 4 days of the training course. NOTE: When registering, you will be asked for a FEMA Student Identification Number (SID). To obtain a SID, click here.

More Ransomware Groups Adopt Tactic of Impersonating IT Support

Over the last year, cybersecurity researchers and analysts reported that ransomware groups have adopted a tactic of impersonating IT support and using email bombing to convince users to provide the threat actors with access to the targeted organization’s network.

In a recent incident reported by Sophos, the 3AM ransomware group spoofed a targeted organization’s official IT department phone number to call one of the organization’s users. Just before the call, the threat actors initiated email bombing, sending the user 24 unsolicited emails in just a few minutes. When the threat actors called the user using the spoofed number, they referenced the email bombing and convinced them to open Microsoft Quick Assist and grant remote access.

In this incident, the threat actors were able to steal over 800GB of data, though many additional actions were mainly blocked due to the company’s strict multi-factor authentication (MFA) policies and security software. However, in other incidents, once remote access is obtained, the threat actors could install malware, steal data, move laterally, elevate privileges, and encrypt data in a ransomware attack.

Vishing Scams: Who is Really Calling You?

The NJCCIC continues to receive reports of fraudulent phone calls in vishing scams. Typically, threat actors acquire publicly available information found online and impersonate specific organizations or individuals. They contact the recipient to extort money or convince their targets to divulge sensitive information, grant access to their accounts or devices, or purchase fraudulent goods or services. In one report, an educational institution received repeated suspicious phone calls from different phone numbers, including spoofed official ones, to appear legitimate.
The threat actors claimed to be “Online IT Training” and asked for the head of the information technology department. When questioned, the threat actors could not respond “off script.”
Threat actors are increasingly leveraging voice cloning and artificial intelligence (AI) technologies to carry out impersonation and extortion scams. They can find and capture snippets of a person’s voice online, through social media platforms, in outgoing voicemail messages, or when the recipient caller answers a call. They can weaponize AI technology with the captured audio to clone a person’s voice and create fraudulent schemes, such as family emergencies, kidnappings, robberies, or car accidents.
In one reported vishing scam, the threat actors impersonated the target’s daughter, claiming to be involved in a car accident. A male voice was also on the line, claiming to be a local law enforcement officer and reporting that the daughter supposedly admitted to using her cell phone while driving. He indicated that she was being held for charges of injuring the other driver, who was pregnant.
The purported officer stated that a bail bond agent would contact them to post bail. Minutes later, a male caller posing as a bail bond agent contacted the target to indicate bail was set at $15,000 cash only and threatened not to tell anyone because it would go on the daughter’s permanent record. After hanging up with the threat actors, the target called their daughter to confirm the call’s legitimacy before going to the bank. The daughter revealed she was not on the call or involved in a car accident.

NIST Launches Development of Cryptographic Accordions

A cryptographic accordion is a tweakable block cipher mode that is itself a cipher on variable-length input. NIST proposes to develop three general-purpose accordions:

  • Acc128 to support typical usage (birthday bounds) with the Advanced Encryption Standard (AES)
  • Acc256 to support typical usage with a 256-bit block cipher (possibly Rijndael-256)
  • BBBAcc to support extended usage (beyond-birthday-bound) with AES

In particular, NIST proposes to develop variants of the HCTR2 technique for these accordions.

NIST invites public comments through August 6, 2025. Please submit them to ciphermodes@nist.gov with the subject line “Comments on Accordion Development.” Comments received in response to this request will be posted on the publication page for a future NIST Special Publication (SP) 800-197A. Submitters’ names and affiliations (when provided) will be included, though contact information will be removed.

Read More

Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities

The Federal Bureau of Investigation (FBI) released this FBI Liaison Alert System (FLASH) to disseminate indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with 5Socks and Anyproxy cyber criminal services’ targeting malware that affects end-of-life (EOL) routers.
Threat actors exploit known vulnerabilities to compromise EOL routers, install malware, and use the routers in a botnet they control to launch coordinated attacks or sell access to the devices as proxy services. The FBI recommends users replace compromised devices with newer models or prevent infection by disabling remote administration and rebooting the router.
This FBI FLASH provides technical details, IOCs, recommended mitigations, and is being provided to assist agencies and organizations in guarding against the persistent malicious actions of cybercriminals.

The Latest Wave of GuLoader Campaigns

Since 2019, GuLoader has been active as a downloader, spreading through spam campaigns with malicious attachments. To evade detection, it downloads encrypted payloads typically from genuine file-sharing websites, such as Google Drive or Microsoft OneDrive. Once installed, the malware attempts to establish persistence by modifying system settings, creating registry entries, and adding itself to startup items.
Since the beginning of 2025, the NJCCIC’s email security solution has observed multiple GuLoader campaigns alternately delivering Snake Keylogger and Remcos remote access tool (RAT) to gain remote access, exfiltrate data, and deploy ransomware. The latest wave of GuLoader campaigns delivers Remcos RAT. It incorporates various themes such as new orders, quotations, purchase orders, invoices, product inquiries, scheduled shipments, packages out for delivery, and updated statements of accounts. These messages contain attached SCR, RAR, ZIP, or ARJ compressed executables that leverage GuLoader to download and install Remcos RAT. Once installed, Remcos RAT logs keystrokes online and offline, captures video and pictures via camera and microphone, and more.
Recommendations
Refrain from responding to unsolicited communications, clicking links, or opening attachments from unknown senders. Exercise caution with communications from known senders. Confirm requests from senders via contact information obtained from verified and official sources. Navigate to official websites by typing official website URLs into browsers manually and only submit account credentials and sensitive information on official websites. Use strong, unique passwords for all accounts and enable multi-factor authentication (MFA) where available, choosing authentication apps or hardware tokens over SMS text-based codes. Keep systems up to date and apply patches after appropriate testing. Run updated and reputable anti-virus or anti-malware programs. Report malicious cyber activity to the FBI’s IC3 and the NJCCIC.

Uptick in Employment Scams

The NJCCIC observed an uptick in employment scams that target and exploit individuals seeking employment. Threat actors first perform reconnaissance on their targets, gathering information from various sources, such as past data breaches, publicly disclosed data, social media profiles, and data purchased on the dark web. They communicate with their targets via emails, text messages, WhatsApp, or Telegram to initiate conversations about purported job opportunities created from legitimate job postings. They may also create and post fraudulent job postings or profiles through trusted professional online employment boards and websites, such as LinkedIn, CareerBuilder, Indeed, and Monster, or via social media platforms like Facebook. They typically impersonate legitimate employers and recruiters and spoof legitimate domains. The threat actors express interest in the target’s compatibility for a vacant position and attempt to ascertain the target’s willingness to explore the opportunity further.
The NJCCIC’s email security solution detected an employment scam in which threat actors use the legitimate Xero platform to create a trial organization to quickly send large amounts of spam emails before they are detected and shut down. In the above campaign, the threat actors impersonate Coca-Cola and incorporate their branding. The email contains a link with the Coca-Cola name in the URL, but it does not direct to Coca-Cola’s official website. Instead, it directs the target to a malicious website that prompts them to update their browser. If clicked and installed, sensitive information and devices may be at risk.  
Threat actors also impersonate legitimate employers and recruiters through multiple random text messages in the hope that their target is an interested job seeker. In the above campaign, the text message outlines the position’s benefits, including remote work, flexible hours, and a potential average daily pay ranging from $300 to $900 or more. To avoid detection, they often request to continue the conversation on a chat platform like WhatsApp or Telegram. Legitimate employers do not typically request that applicants communicate or send information through instant messaging platforms.
The NJCCIC also received multiple reports of threat actors creating fake profiles on LinkedIn, impersonating employers and recruiters, and sending direct messages to potential victims regarding fraudulent job postings. The emails request interested targets to provide their email addresses and resumes. If there is no response, the threat actors sometimes attempt to contact their targets via email and phone.
Once contact with a target in these employment scams is established, the threat actors often request information as part of the application process or job offer. They intend to steal personally identifiable information (PII) or monetary funds, potentially committing identity theft and launching other cyberattacks. They may conduct fake online interviews to inquire about work experience, salary expectations, and other typical employment concerns. Threat actors may ask for personal information or request their target to pay processing or application fees, training, or background checks. They may also send fraudulent invoices for equipment, with instructions to pay using cash, Zelle, or PayPal and a promise of reimbursement. In some instances, they also partake in fraudulent check scams via mail to cover all or a portion of the job-related fees or expenses. Until the fraudulent check supposedly clears, threat actors pressure their targets to start the job immediately and insist they front the money, resulting in monetary losses.
Key suspicious indicators of employment scams include vagueness from the purported employer or recruiter about the position, the job sounding “too good to be true,” and upfront requests for personal and financial information, such as a Social Security number, a driver’s license number, or banking information for direct deposits. Threat actors may also create urgency to respond or accept a job offer. Using unofficial communication methods, including personal email accounts, non-company email domains, teleconferencing applications, and apps like WhatsApp, Telegram, Signal, or Wire, are also red flags.
Besides targeting job seekers, threat actors also target corporate human resources departments and recruiters to steal account credentials and funds. They abuse legitimate message services and job platforms to apply for real jobs. Researchers discovered the financially motivated Venom Spider threat group sending spearphishing emails to the hiring manager or recruiter. These emails contain links directing them to download the purported resume from an external website. The threat actors insert a CAPTCHA box to create legitimacy and bypass security controls. They then drop a backdoor called More_eggs and use server polymorphism to deliver the payloads and evade detection and analysis.
Recommendations
Refrain from clicking links and opening attachments from unknown senders, and exercise caution with communications from known senders. Examine potential offers by contacting the company’s human resources department directly via official contact information and researching potential employers online to determine if others have reported a scam. Navigate to websites directly for authentic job postings by manually typing the URL into a browser instead of clicking on links delivered in communications to ensure the visited websites are legitimate. Refrain from contacting or clicking on unknown telephone numbers found in unsolicited messages or pop-up notifications. Avoid downloading software at the request of unknown individuals, and refrain from divulging sensitive information or providing funds. Review additional information on job scams on the FTC’s website. Report malicious cyber activity to the FTC, the FBI’s IC3, and the  NJCCIC. If victimized, report the scam directly to the respective employer or employment listing service. If PII compromise is suspected or detected, contact your local law enforcement department and review the Identity Theft and Compromised PII NJCCIC Informational Report for additional recommendations and resources.

Critical Patches Issued for Microsoft Products, May 13, 2025 – PATCH NOW

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

THREAT INTELLIGENCE:
There are currently no reports of these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED:

  • Visual Studio Code
  • Windows Kernel
  • .NET, Visual Studio, and Build Tools for Visual Studio
  • Remote Desktop Gateway Service
  • Microsoft Defender for Endpoint
  • Microsoft Defender for Identity
  • Windows Secure Kernel Mode
  • Windows Hardware Lab Kit
  • Azure DevOps
  • Microsoft Edge (Chromium-based)
  • Microsoft Dataverse
  • Azure Automation
  • Windows Trusted Runtime Interface Driver
  • Windows Routing and Remote Access Service (RRAS)
  • Windows Virtual Machine Bus
  • Windows Installer
  • Windows Drivers
  • Windows File Server
  • Windows Media
  • Universal Print Management Service
  • UrlMon
  • Windows LDAP – Lightweight Directory Access Protocol
  • Role: Windows Hyper-V
  • Windows SMB
  • Windows Deployment Services
  • Windows Remote Desktop
  • Active Directory Certificate Services (AD CS)
  • Windows Fundamentals
  • Microsoft Brokering File System
  • Web Threat Defense (WTD.sys)
  • Azure Storage Resource Provider
  • Azure File Sync
  • Microsoft PC Manager
  • Microsoft Office SharePoint
  • Microsoft Office Excel
  • Microsoft Office PowerPoint
  • Microsoft Office
  • Windows Common Log File System Driver
  • Azure
  • Windows Win32K – GRFX
  • Microsoft Scripting Engine
  • Windows DWM
  • Visual Studio
  • Microsoft Office Outlook
  • Windows NTFS
  • Windows Ancillary Function Driver for WinSock
  • Microsoft Power Apps

RISK:
Government:

  • Large and medium government entities: High
  • Small government entities: Medium

Businesses:

  • Large and medium business entities: High
  • Small business entities: Medium

Home users: Low

TECHNICAL SUMMARY:
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.

A full list of all vulnerabilities can be found in the Microsoft link in the References section.

Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

RECOMMENDATIONS:
We recommend the following actions be taken:

  • Apply appropriate patches or appropriate mitigations provided by Microsoft to vulnerable systems immediately after appropriate testing. (M1051: Update Software)
    • Safeguard 7.1: Establish and Maintain a Vulnerability Management Process: Establish and maintain a documented vulnerability management process for enterprise assets. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.
    • Safeguard 7.4: Perform Automated Application Patch Management: Perform application updates on enterprise assets through automated patch management on a monthly, or more frequent, basis.
       
  • Apply the Principle of Least Privilege to all systems and services and run all software as a non-privileged user (one without administrative rights) to diminish the effects of a successful attack. (M1026: Privileged Account Management)
    • Safeguard 4.7: Manage Default Accounts on Enterprise Assets and Software: Manage default accounts on enterprise assets and software, such as root, administrator, and other pre-configured vendor accounts. Example implementations can include: disabling default accounts or making them unusable.
    • Safeguard 5.4: Restrict Administrator Privileges to Dedicated Administrator Accounts: Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Conduct general computing activities, such as internet browsing, email, and productivity suite use, from the user’s primary, non-privileged account.
       
  • Remind all users not to visit untrusted websites or follow links/open files provided by unknown or untrusted sources. (M1017: User Training)
    • Safeguard 14.1: Establish and Maintain a Security Awareness Program: Establish and maintain a security awareness program. The purpose of a security awareness program is to educate the enterprise’s workforce on how to interact with enterprise assets and data in a secure manner. Conduct training at hire and, at a minimum, annually. Review and update content annually, or when significant enterprise changes occur that could impact this Safeguard.
    • Safeguard 14.2: Train Workforce Members to Recognize Social Engineering Attacks: Train workforce members to recognize social engineering attacks, such as phishing, pre-texting, and tailgating.
       
  • Use capabilities to prevent suspicious behavior patterns from occurring on endpoint systems. This could include suspicious process, file, API call, etc. behavior. (M1040: Behavior Prevention on Endpoint)
    • Safeguard 13.2 : Deploy a Host-Based Intrusion Detection Solution: Deploy a host-based intrusion detection solution on enterprise assets, where appropriate and/or supported.
    • Safeguard 13.7 : Deploy a Host-Based Intrusion Prevention Solution: Deploy a host-based intrusion prevention solution on enterprise assets, where appropriate and/or supported. Example implementations include use of an Endpoint Detection and Response (EDR) client or host-based IPS agent.

REFERENCES:

Microsoft:

https://msrc.microsoft.com/update-guide/releaseNote/2025-May

https://msrc.microsoft.com/update-guide

Multiple Vulnerabilities in Fortinet ProductsCould Allow for Arbitrary Code Execution

This Multi-State Information Sharing and Analysis Center (MS-ISAC) Advisory is being provided to assist agencies and organizations in guarding against the persistent malicious actions of cybercriminals.
Multiple vulnerabilities have been discovered in Fortinet Products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user, threat actors could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Threat Intelligence Fortinet has observed exploitation of CVE-2025-32756 in the wild on FortiVoice.
Systems Affected
FortiADC 7.2.0 through 7.2.6 FortiADC 7.4.0 through 7.4.4 FortiADC 7.6.1 FortiADCManager 7.6.0 FortiAIOps 2.0.0 through 2.0.1 FortiAnalyzer 6.2.0 through 6.2.11 FortiAnalyzer 6.4.0 through 6.4.14 FortiAnalyzer 6.4.14 through 6.4.15 FortiAnalyzer 7.0.0 through 7.0.13 FortiAnalyzer 7.2.0 through 7.2.10 FortiAnalyzer 7.4.0 through 7.4.3 FortiAnalyzer 7.4.2 FortiAnalyzer 7.4.3 through 7.4.6 FortiAnalyzer 7.6.0 through 7.6.2 FortiAnalyzer-BigData 6.2 all versions FortiAnalyzer-BigData 6.4 all versions FortiAnalyzer-BigData 7.0 all versions FortiAnalyzer-BigData 7.2 7.2.0 through 7.2.5 FortiAnalyzer-BigData 7.4 7.4.0 FortiAuthenticator 6.6.0 through 6.6.1 FortiCamera 1.1 all versions FortiCamera 2.0 all versions FortiCamera 2.1.0 through 2.1.3 FortiClientEMS 7.4.0 through 7.4.1 FortiClientEMS Cloud 7.4 7.4.0 through 7.4.1 FortiClientMac 7.0 all versions FortiClientMac 7.2.0 through 7.2.8 FortiClientMac 7.4.0 through 7.4.2 FortiClientWindows 7.2.0 through 7.2.1 FortiDDoS 5.7.0 through 5.7.3 FortiDDoS-F 7.0 7.0.0 through 7.0.1 FortiDDoS-F 7.0 7.0.1 through 7.0.4 FortiDeceptor 5.2.0 FortiDeceptor 5.3.0 through 5.3.1 FortiEDR Manager 5.0 all versions FortiEDR Manager 5.1 all versions FortiEDR Manager 5.2 all versions FortiEDR Manager 6.0 all versions FortiEDR Manager 6.2 6.2.0 through 6.2.4 FortiExtender 7.0.0 through 7.0.5 FortiExtender 7.2.0 through 7.2.5 FortiExtender 7.4.0 through 7.4.5 FortiGuest 1.0 all versions FortiGuest 1.1 all versions FortiGuest 1.2.0 through 1.2.1 FortiGuest 1.3.0 FortiMail 6.2 all versions FortiMail 6.4 all versions FortiMail 7.0.0 through 7.0.8 FortiMail 7.2.0 through 7.2.7 FortiMail 7.4.0 through 7.4.4 FortiMail 7.6.0 through 7.6.2 FortiManager 6.2.0 through 6.2.11 FortiManager 6.4.0 through 6.4.15 FortiManager 7.0.0 through 7.0.13 FortiManager 7.2.0 through 7.2.10 FortiManager 7.4.0 through 7.4.6 FortiManager 7.6.0 through 7.6.2 FortiManager Cloud 6.4 all versions FortiManager Cloud 7.0 7.0.1 through 7.0.8 FortiManager Cloud 7.0 7.0.10 FortiManager Cloud 7.0 7.0.12 FortiManager Cloud 7.2 7.2.1 through 7.2.4 FortiNAC-F 7.2 7.2.0 through 7.2.6 FortiNAC-F 7.4 7.4.0 FortiNDR 1.1 all versions FortiNDR 1.2 all versions FortiNDR 1.3 all versions FortiNDR 1.4 all versions FortiNDR 1.5 all versions FortiNDR 7.0.0 through 7.0.6 FortiNDR 7.1 all versions FortiNDR 7.2.0 through 7.2.4 FortiNDR 7.4.0 through 7.4.7 FortiNDR 7.6.0 FortiOS 6.4 all versions FortiOS 7.0.0 through 7.0.14 FortiOS 7.2.0 through 7.2.7 FortiOS 7.4.0 through 7.4.3 FortiOS 7.4.4 through 7.4.6 FortiOS 7.6.0 FortiPortal 7.0.0 through 7.0.9 FortiPortal 7.2.0 through 7.2.5 FortiPortal 7.4.0 FortiProxy 7.6.0 through 7.6.1 FortiRecorder 6.0 all versions FortiRecorder 6.4 all versions FortiRecorder 7.0.0 through 7.0.5 FortiRecorder 7.2.0 through 7.2.3 FortiSandbox 3.2 all versions FortiSandbox 4.0.0 through 4.0.5 FortiSandbox 4.2.0 through 4.2.7 FortiSandbox 4.4.0 through 4.4.6 FortiSIEM 5.3 all versions FortiSIEM 5.4 all versions FortiSIEM 6.1 all versions FortiSIEM 6.2 all versions FortiSIEM 6.3 all versions FortiSIEM 6.4 all versions FortiSIEM 6.5 all versions FortiSIEM 6.6 all versions FortiSIEM 6.7 all versions FortiSIEM 7.0 all versions FortiSOAR 6.4 all versions FortiSOAR 7.0 all versions FortiSOAR 7.2 all versions FortiSOAR 7.3 all versions FortiSOAR 7.4.0 through 7.4.2 FortiSwitch 7.2.0 through 7.2.8 FortiSwitch 7.4.0 through 7.4.3 FortiSwitchManager 7.2.5 FortiVoice 6.0.0 through 6.0.12 FortiVoice 6.4.0 through 6.4.10 FortiVoice 7.0.0 through 7.0.6 FortiVoice 7.2.0 FortiVoiceUCDesktop 3.0 all versions FortiWeb 6.2 all versions FortiWeb 6.3 all versions FortiWeb 6.4 all versions FortiWeb 7.0.0 through 7.0.10 FortiWeb 7.2.0 through 7.2.9 FortiWeb 7.4.0 through 7.4.4 FortiWeb 7.6.0 FortiWLC 8.6.0 through 8.6.7
Risk
Government:
– Large and medium government entities: High – Small government entities: Medium
Businesses: – Large and medium business entities: High
– Small business entities: Medium
Home Users: Low
Recommendations
Apply appropriate updates provided by Fortinet to vulnerable systems immediately after appropriate testing. Apply the Principle of Least Privilege to all systems and services. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack. Use vulnerability scanning to find potentially exploitable software vulnerabilities to remediate them. Architect sections of the network to isolate critical systems, functions, or resources. Use physical and logical segmentation to prevent access to potentially sensitive systems and information. Use a DMZ to contain any internet-facing services that should not be exposed from the internal network. Configure separate virtual private cloud (VPC) instances to isolate critical cloud systems. Use capabilities to detect and block conditions that may lead to or be indicative of a software exploit occurring.
References
Fortinet:
https://www.fortiguard.com/psirt/FG-IR-24-381
https://www.fortiguard.com/psirt/FG-IR-24-025
https://www.fortiguard.com/psirt/FG-IR-24-388
https://www.fortiguard.com/psirt/FG-IR-24-548
https://www.fortiguard.com/psirt/FG-IR-24-380
https://www.fortiguard.com/psirt/FG-IR-25-016
https://www.fortiguard.com/psirt/FG-IR-23-167
https://www.fortiguard.com/psirt/FG-IR-23-490
https://www.fortiguard.com/psirt/FG-IR-24-258
https://www.fortiguard.com/psirt/FG-IR-24-552
https://www.fortiguard.com/psirt/FG-IR-25-122
https://www.fortiguard.com/psirt/FG-IR-25-254
https://www.fortiguard.com/psirt/FG-IR-24-472
https://www.fortiguard.com/psirt/FG-IR-24-023