News

Fortinet publicly disclosed today a critical FortiManager API vulnerability, tracked as CVE-2024-47575, that was exploited in zero-day attacks to steal sensitive files containing configurations ...
A suspected nation-state campaign has been targeting Fortinet FortiManager customers — likely including MSPs — since at least late June, according to security researchers.
The security vendor apparently began informing customers privately about the issue a few days ago but has since opened up about the issue in its FortiManager control software. The vulnerability ...
A new Fortinet FortiManager flaw dubbed "FortiJump" and tracked as CVE-2024-47575 has been exploited since June 2024 in zero-day attacks on over 50 servers, according to a new report by Mandiant.
Fortinet has confirmed that a critical zero-day vulnerability affecting its FortiManager network management solution is being exploited in the wild.. In an October 23 security advisory, the ...
A critical-severity FortiManager vulnerability publicly disclosed by Fortinet this week has been exploited in attacks dating back to late June, according to Mandiant researchers.
A critical vulnerability discovered in Fortinet Inc.’s FortiManager is being exploited in the wild, and users are being advised to implement changes to protect against the threat. The ...
From the FortiManager, you can then manage the legit downstream FortiGate firewalls, view config files, take credentials and alter configurations.
At the weekend, Beaumont added that six new versions of FortiManager had been released to close the zero-day gap in the product. A CVE entry or a description of the problem is still missing.
Fortinet released a security update to address a vulnerability in FortiManager. A remote cyber threat actor could exploit this vulnerability to take control of an affected system.. Users and ...
Fortimanager: Device Manager > click on the device > System > Dashboard > Revision History > Click on “View installation history” link and click on “Browse” icon for the most recent ...