Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

UNC5820 exploiting FortiManager flaw

Type
Campaign
Actors
💡UNC5820
Pub. date
October 24, 2024
Initial access
0-day vulnerability
Impact
Data exfiltration
Observed techniques
Vulnerability exploitationCredential theft
Targeted technologies
Fortinet FortiManager
References
https://cloud.google.com/blog/topics/threat-intelligence/fortimanager-zero-day-exploitation-cve-2024-47575https://www.fortiguard.com/psirt/FG-IR-24-423
Status
Finalized
Last edited
Oct 28, 2024 1:40 PM

Researchers identified a zero-day vulnerability, CVE-2024-47575, impacting FortiManager, exploited by the UNC5820 group. This flaw allows unauthorized access, enabling threat actors to exfiltrate critical configuration data. The vulnerability has been actively exploited, with compromised devices traced to connections from specific IP addresses. Fortinet has released mitigations and version updates to address this issue.

The vulnerability allows remote attackers to execute arbitrary code or commands via the fgfmd daemon in FortiManager. Initial exploitation was observed in June 2024, where UNC5820 exfiltrated FortiGate configuration data, including user credentials and policies. IP addresses and device information were staged in compressed files, and outbound connections followed file creation, signaling exfiltration. Indicators include specific IP addresses, serial numbers, and unauthorized device additions in FortiManager logs.

Made with 💙 by Wiz

Last Updated: April 3, 2025