{"uuid": "581e79e2-c3d1-4c59-ac47-c8e165f1ed75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42475", "type": "exploited", "source": "https://t.me/darkcommunityofficial/996", "content": "\ud83d\udc6e\u200d\u2640\ufe0f Chinese hackers hacked 20 thousand FortiGate systems | \u041f\u0440\u0438\u0432\u0435\u0442, \u0434\u0440\u0443\u0433. \u041d\u0430 \u0441\u0432\u044f\u0437\u0438 \u042d\u043b\u043b\u0438\u043e\u0442.\n\nDutch military intelligence has warned that the fallout from Chinese hackers is \"much larger\" than initially thought. Between 2022 and 2023, hackers compromised 20,000 Fortinet FortiGate systems worldwide by exploiting a critical vulnerability.\n\n\u2014 In February 2024, MIVD, together with the Dutch General Intelligence and Security Service (AIVD), published a report according to which Chinese hackers exploited a critical RCE vulnerability in FortiOS/FortiProxy ( CVE-2022-42475 ) for several months in 2022 and 2023 .\n\n\u2757\ufe0f The narrow-eyed still have access to most devices, since Coathanger is extremely difficult to detect, because the malware intercepts system calls so as not to reveal its presence.\n\n#News #RCE #Forti #CVE", "creation_timestamp": "2024-06-15T00:03:27.000000Z"}