Fortinet VPN Zero-Days: Nation-States Exploit Unpatched VPN Gateways for Years

Multiple zero-day vulnerabilities in Fortinet and Pulse Secure VPN appliances — the gateways used to protect remote access to corporate networks — were exploited by Chinese and Russian nation-state actors for years before patches were deployed.

Fortinet / Pulse Secure / Defence Contractors·2021·2 min read

Background

SSL VPN appliances became critical infrastructure during the COVID-19 pandemic, enabling remote work for millions. Fortinet FortiOS and Pulse Secure (Ivanti) Connect Secure were among the most widely deployed. Vulnerabilities in these appliances gave attackers access to corporate networks without needing any credentials.

The Attack

Multiple critical vulnerabilities accumulated: CVE-2018-13379 (FortiOS path traversal allowing credential extraction), CVE-2019-11510 (Pulse Secure arbitrary file reading), and CVE-2021-22893 (Pulse Secure zero-day). CISA documented that all three were among the most actively exploited vulnerabilities in 2020 and 2021. Chinese APT actors exploited Pulse Secure CVE-2021-22893 against US Defence Industrial Base organisations specifically, planting backdoors and using legitimate VPN credentials to move through networks undetected. The exploitation often occurred months before patches were available.

Response

CISA and FBI issued joint advisories listing Fortinet and Pulse Secure vulnerabilities as top exploited weaknesses. Mandiant published detailed analysis of the Pulse Secure zero-day exploitation. Ivanti (Pulse Secure's parent) released emergency patches. CISA ordered all federal agencies to remediate immediately.

Outcome

Hundreds of thousands of Fortinet and Pulse Secure VPN appliances remained unpatched for months after patches were available. FBI notifications to victim organisations found that many were unaware their VPN appliances had been compromised. The case demonstrated that network perimeter devices (VPNs, firewalls) are extremely high-value zero-day targets.

Key Takeaways

  1. VPN and firewall appliances must be patched with the highest urgency — they are the front door to every corporate network
  2. Expose as little VPN management interface to the internet as possible — use out-of-band management networks
  3. Even after patching, check for persistence mechanisms — attackers plant backdoors before patch deployment
  4. Network access logging on VPN appliances should be treated as critical security telemetry
FortinetPulse SecureVPN zero-daynation-stateremote access