veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

291
active users

#Fortinet

3 posts2 participants0 posts today

Fortinet FortiGate 2025 Firewall Guide 🔐

Choosing the right firewall isn’t one-size-fits-all. We’ve compared five Fortinet FortiGate models—30G, 50G, 70G, 100F, and Rugged 70G-5G-DUAL—by performance, features, and best use cases.

From small office POS security to enterprise-scale SD-WAN to ruggedized IoT environments—there’s a FortiGate for every scenario.

📖 Read: datacenter360.ca/news/fortinet
#CyberSecurity #Fortinet #Firewalls #InfoSec #NetworkSecurity #ThreatDetection

Bald ist wieder #itsa. Anfang Oktober trifft man sich wie in jedem Jahr in #Nürnberg auf dem Messegelände, um sich zum Thema #Security auszutauschen.

#FORTINET ist natürlich mit dabei, inklusive einer Ausstellung unserer wunderschönen Ruggedized-Gerätelandschaft.

Ich bin nicht die ganze Woche vor Ort, vermutlich nur am ersten Tag, also wer mal hallo sagen möchte, komm Dienstags vorbei. ;-)

Noch kein Ticket? Dann gerne hier entlang: events.fortinet.com/it-sa2025

Continued thread

🛡️ How to protect your systems:
🔹 Patch: Patch your FortiWeb instance if it is publicly exposed; otherwise, remove outside access to the affected admin panel.
🔹 Preemptive blocking: Use Crowdsec CTI to block IPs exploiting CVE-2025-25257 👉 app.crowdsec.net/cti?q=cves%3A
🔹 Stay proactive: Install the Crowdsec Web Application Firewall to stay ahead of exploit attempts, with 100+ virtual patching rules available. 👉 doc.crowdsec.net/docs/next/app

🧵5/6

CrowdSec ConsoleCrowdSec Cyber Threat Intelligence | CrowdSec ConsoleLeverage Cyber Threat Intelligence (CTI) on CrowdSec Console to enhance your security strategies. Gain actionable insights to defend against emerging threats.
Continued thread

📈 Trend analysis:
🔹 CrowdSec detected the first in-the-wild exploitation of this vulnerability on July 11th, shortly after we rolled out detection rules. Using our wayback tools, we were able to establish that there were no exploitation attempts before July 11th, confirming once again that public exploits are a key driver of vulnerability weaponization.
🔹 For CVE-2025-25257, CrowdSec has observed about 40 distinct IPs producing about 500 attack events in total. Most of these attacks occurred on Friday, July 11th, the day the exploit was publicized. The attacks on Friday were mainly due to a presumably coordinated attacker spinning up a bunch of machines on Scaleway cloud to use in a broad scanning campaign. Over the weekend, the exploit quickly lost popularity. This might be due to the fact that the exploit requires the Fabric Connector administrative interface to be publicly accessible, which is somewhat unlikely. While we cannot make predictions, CrowdSec expects exploitation signals to pick up slightly this week as vulnerability scanners start looking for vulnerable devices. However, we don’t expect the attacker volume for this vulnerability to reach that of other Fortinet-related CVEs.

🧵4/6

Continued thread

🛠️ About the exploit:
🔹 The Fortinet FortiWeb Fabric Connector is an integration component designed to enhance application security by linking FortiWeb web application firewalls (WAFs) with other elements of the Fortinet Security Stack. It enables policy enforcement and automated threat response by leveraging intelligence gathered from FortiGate firewalls, FortiSandbox, FortiAnalyzer, and other “Fabric-enabled” devices. It is in some sense a glue product that holds an array of different Fortinet products together.
🔹 The vulnerability allows unauthenticated attackers to execute arbitrary SQL statements against the MySQL database connected to Fabric Connector. As this database runs as root per default, this attack can be chained to run arbitrary Python code on the affected machine, allowing attackers to further compromise the system. The vulnerability affects various FortiWeb versions from 7.0 to 7.6. As a workaround, the vendor recommends disabling the administrative interface to external visitors.

🧵3/6

Continued thread

⚠️ Key findings:
🔹 A new SQL injection vulnerability in a FortiWeb component allows attackers to execute arbitrary code on the affected machine.
🔹 CrowdSec has been tracking exploitation since the 11th of July 2025.
🔹 Data from the CrowdSec network indicates that attacker interest in the vulnerability remains very limited.

🧵2/6

FortiWeb-Admins aufgepasst! 🚨 Für die kritische #Sicherheitslücke (CVE-2025-25257, CVSS 9.6) steht jetzt ein Exploit bereit – Angreifer können ohne Login SQL-Injection & Codeausführung erreichen. Jetzt dringend patchen! 🔒 Mehr Infos: heise.de/news/Exploit-verfuegb #Cybersecurity #Fortinet #PatchNow
#newz

Kurzlink: heise.de/-10485654

heise online · Exploit verfügbar: FortiWeb-Sicherheitslücke jetzt patchen!By Dirk Knop