Published on: 27 August 2019
Fortinet and Pulse Secure released security advisories to address the vulnerabilities in their SSL VPN services. An unauthenticated remote attacker could exploit the vulnerabilities by sending a specially crafted HTTP request to an affected system.
Reports indicate that active exploitation and mass scanning activities against the vulnerabilities in SSL VPN services (CVE-2018-13379 and CVE-2019-11510) have been observed. Users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Successful exploitation of the vulnerabilities could lead to credential leakage, information disclosure and arbitrary code execution on an affected system.
To mitigate the risks, system administrators are advised to take the following action immediately:
https://fortiguard.com/psirt/FG-IR-18-384
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11507 (to CVE-2019-11510)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11538 (to CVE-2019-11543)