Summary: 2025/04/17 16:39

First reported date: 2016/01/13
Inquiry period : 2025/04/10 16:39 ~ 2025/04/17 16:39 (7 days), 8 search results

전 기간대비 신규 트렌드를 보이고 있습니다.
공격기술
Exploit Backdoor RCE hacking 도 새롭게 확인됩니다.
기관 및 기업 Fortinet 도 새롭게 확인됩니다.
기타 FortiGate Update Vulnerability CVE access 등 신규 키워드도 확인됩니다.

 * 최근 뉴스기사 Top3:
    ㆍ 2025/04/14 Fortinet FortiGate fixes circumvented by symlink exploit
    ㆍ 2025/04/12 Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1FortiGate 8 ▲ new
2Fortinet 7 ▲ new
3Update 7 ▲ new
4Vulnerability 6 ▲ new
5CVE 5 ▲ new
6access 5 ▲ new
7Exploit 5 ▲ new
8Symbolic 2 ▲ new
9Link 2 ▲ new
10stealth 1 ▲ new
11ZeroDay 1 ▲ new
12plant 1 ▲ new
13Report 1 ▲ new
14Backdoor 1 ▲ new
15Malware 1 ▲ new
16DarkWeb 1 ▲ new
17RCE 1 ▲ new
18trick 1 ▲ new
19wellknown 1 ▲ new
20sale 1 ▲ new
21Alleged 1 ▲ new
22vulnerable 1 ▲ new
23bypass 1 ▲ new
24wont 1 ▲ new
25hacking 1 ▲ new
26securityaffairs 1 ▲ new
27threat 1 ▲ new
28file 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


No data.

Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


Keyword Average Label
Attack technique
Technique

This is an attack technique that is becoming an issue.


Keyword Average Label
Exploit
5 (62.5%)
Backdoor
1 (12.5%)
RCE
1 (12.5%)
hacking
1 (12.5%)
Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
Fortinet
7 (100%)
Threat info
Last 5

SNS

(Total : 6)
  Total keyword

Fortinet Update Vulnerability Attacker CVE Exploit ZeroDay RCE DarkWeb hacking Backdoor

No Title Date
1Cyber_OSINT @Cyber_O51NT
Fortinet has issued fixes after hackers exploited flaws to plant stealth backdoors on FortiGate devices, maintaining access even after patches. Users are urged to update their systems promptly. #CyberSecurity #Fortinet https://t.co/x0HZLRWeme
2025.04.14
2Cyber_OSINT @Cyber_O51NT
Fortinet warns that attackers can maintain read-only access to FortiGate devices via a symbolic link, even after patching vulnerabilities like CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762, affecting SSL-VPN-enabled devices. https://t.co/gMCtKRq5gy
2025.04.13
3ThreatMon @MonThreat
Alleged sale of FortiGate 0day exploit On a well-known dark web forum, a threat actor has advertised an alleged zero-day exploit impacting FortiGate firewalls. The post claims the vulnerability enables unauthenticated remote code execution (RCE) and full configuration access to https://t.co/KPpueYH
2025.04.13
4Pierluigi Paganini - Security Affairs @securityaffairs
#Symbolic #Link trick lets attackers bypass #FortiGate patches, #Fortinet warns https://t.co/wWRcDw4tK5 #securityaffairs #hacking @Fortinet @FortinetLATAM
2025.04.12
5Cyber_OSINT @Cyber_O51NT
Fortinet has warned that attackers retain read-only access to vulnerable FortiGate devices post-patching via SSL-VPN symlink exploits, leveraging previously patched flaws like CVE-2022-42475 and CVE-2023-27997. #Fortinet #CyberSecurity https://t.co/bwTHDAffXx
2025.04.12

Additional information

No data
No data
No data
No data
Beta Service, If you select keyword, you can check detailed information.