Wednesday, October 28, 02:27
Home security VPN: Hacking attacks through Fortinet, Palo Alto, Pulse Secure products

VPN: Hacking attacks through Fortinet, Palo Alto, Pulse Secure products

If you have business and your employees are using VPN from FortinetThe Palo Alto or the Pulse Secure, you should definitely repair your products and check for any damage systems you.


As it became known in September, a team hackers from China, nicknamed APT5, attacks corporate VPNs servers using Fortinet and Pulse Secure products.

The actions of this group have become known, but no one can be sure that there is no other team that will attempt to exploit them. vulnerabilities. The UK's National Cybersecurity Center (NCSC) warns organizations that Palo's GlobalProtect portal and GlobalProtect Gateway interface are also being attacked by hackers. These attacks are still ongoing and target not only British but also international organizations such as government, military, academia, business and healthcare.

The NCSC gave 6 the biggest vulnerabilities exploited by the groups hacking in VPN products. At the same time, patches are available for each vulnerability, and admins are immediately advised to avoid compromises as the attackers' code is available online.


VPN defects will allow hackers to gain access credentials that can be used to connect to the VPN and change settings.

  • The defects affecting the Pulse Connect Secure VPN are CVE-2019-11510 and CVE-2019-11539.
  • The defects affecting Fortinet's Fortigate devices are CVE-2018-13379, CVE-2018-13382 and CVE-2018-13383.
  • Both the GlobalProtect portal and Palo's GlobalProtect Gateway interface are CVE-2019-1579.

NCSC recommends that organizations targeted by government-backed hackers check all settings and logs for services that users connect to via VPN.

It also recommends that the appliances be thoroughly cleaned if they have been previously attacked. In addition, organizations should implement two-factor authentication for VPN and disable redundant features and ports on VPN.


Please enter your comment!
Please enter your name here

In a world without fences and walls, who needs Gates and Windows


Among Us: players were hit by a spam attack

InnerSloth, creator of the popular game Among Us, faced an attack that affected its players last week. More specifically, some ...

Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...