Skip to content

Commit

Permalink
Case 5 casefile
Browse files Browse the repository at this point in the history
  • Loading branch information
Maximand committed Feb 9, 2024
1 parent 5e3f879 commit cb21727
Showing 1 changed file with 59 additions and 0 deletions.
59 changes: 59 additions & 0 deletions _cases/2024/DIVD-2024-00005.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
---
layout: case
title: Authentication Bypass in JetBrains TeamCity
excerpt: "Successful exploitation of CVE-2024-23917 allows an unauthenticated attacker with HTTP(S) access to a TeamCity server to bypass authentication checks and gain administrative control of that TeamCity server."
author: Max van der Horst
lead: Ralph Horn
researchers:
- Victor Pasman
- Ralph Horn
- Max van der Horst
cves:
- CVE-2024-21762
product:
- FortiOS SSL VPN
versions:
- 7.4.0 through 7.4.2
- 7.2.0 through 7.2.6
- 7.0.0 through 7.0.13
- 6.4.0 through 6.4.14
- 6.2.0 through 6.2.15
- All versions 6.0
recommendation: "Update your devices to a patched version as soon as possible"
patch_status: Released
workaround: None
status : open
start: 2024-02-08
end:
timeline:
- start: 2024-02-08
end:
event: "DIVD starts researching this vulnerability in collaboration with Fox-IT."
- start: 2024-02-09
end:
event: "DIVD sends out first round of notifications.."
#ips:
# ips is used for statistics after the case is closed. If it is not applicable, you can set IPs to n/a (e.g. stolen credentials)
# This field becomes mandatory when the case status is set to 'Closed'

# You can set IPs to n/a when this case isn't about IPs (e.g. stolen credentials)
---
## Summary

Fortinet is warning that a new Remote Code Execution vulnerability in FortiOS SSL VPN is being exploited by threat actors. Fortinet advises updating to the latest version to install the patch. Failing to install the patch might lead to a threat actor completely taking over your network.

## Recommendations

Fortinet urges users to upgrade to the latest version as soon as possible. If you are compromised, DIVD advises you start your incident response process immediately.

## What we are doing

DIVD is currently working to identify vulnerable instances and notify the owners of these systems.

{% comment %} Leave this here, so we see a timeline {% endcomment %}
{% include timeline.html %}

## More information
* [FortiGuard advisory](https://www.fortiguard.com/psirt/FG-IR-24-015)
* [CVE-2024-21762](https://nvd.nist.gov/vuln/detail/CVE-2024-23917)
* {% cve CVE-2024-21762 %}

0 comments on commit cb21727

Please sign in to comment.