Red Hot Cyber, The cybersecurity news

Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

FortiGate Under Attack: Tools for Mass Exploitation of Exposed APIs for Sale

Redazione RHC : 23 June 2025 10:26

A new and alarming development is shaking up the cybersecurity landscape: a malicious actor has advertised on the dark web a highly sophisticated exploit aimed at compromising FortiGate devices.

A new exploit priced at $12,000 for FortiGate firewalls has appeared for sale on the popular underground forum Exploit. The post, published by a user with the pseudonym Anon-WMG, presents a tool capable of massively compromising Fortinet devices by exploiting exposed APIs.

Technical features of the exploit

Called “FortiGate API Dump Exploit (~7.2 and below)”, the tool is capable of interacting with over 170 FortiGate API endpoints, with declared compatibility for versions 6.x and 5.x, and also tested on 7.2.6 and earlier. Features include:

  • Automatic dump from 170+ Fortinet API endpoints
  • Extraction of sensitive information: firewall configurations, local VPN users, SSL portals, backups, SNMP keys, DNS, HA and NTP parameters
  • Multithreading support (over 20 threads) for fast and massive scans
  • Output in JSON format and configuration file structured
  • Stealth headers and dedicated reporting module (“Report Runner”)

The tool targets:

  • FortiGate firewall with exposed API (default ports: 443 and 10443)
  • Incorrectly configured SSL/VPN portals

The author claims that the exploit is capable of compromising:

  • Internal and administrative network credentials (including hashes and encrypted passwords)
  • Active SAML/RADIUS/LDAP tokens
  • VPN tokens and IPsec session IDs
  • Complete device configuration backups

Impact and prevalence and selling price

The implications are serious and include:

  • Internal network access and lateral movement
  • Theft of configurations, backups and credentials
  • Compromising VPN communications in progress
  • Possibility of escalation through legitimate user tokens

The tool has been tested on numerous versions of FortiOS: v6.0.9, 6.2.5, 7.0.4, 7.2.1, 7.2.6, 6.2.x and others.

  • Asking price: $12,000
  • Payment in cryptocurrency
  • Negotiation via escrow to guarantee (at least formally) the transaction
  • Provided some samples via temporary link on “send.exploit.in”
  • The author warns to contact him only in case of real intention to purchase

Countermeasures and recommendations

Organizations using FortiGate should take immediate action, especially if:

  • APIs are exposed directly to the Internet
  • Devices are running outdated firmware versions
  • VPN/SSL portals are not configured correctly

Operational Recommendations:

  • Perform an immediate audit of exposed interfaces
  • Update all devices to the latest supported FortiOS version
  • Restrict API access to internal or authorized IP addresses only
  • Enable API logs to detect suspicious activity
  • Revoke and regenerate active VPN tokens, verifying the integrity of configurations

Conclusions

The availability of an automated exploit like this on the underground market highlights once again how critical it is to even partially expose inadequately protected management interfaces. In this case, unauthenticated access to FortiGate APIs can lead to the complete compromise of a network.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli