⚠️ CVE-2025-33093: IBM Sterling Partner Engagemen... 🔥 CVE-2025-4104: The Frontend Dashboard plugin ... 🟡 CVE-2025-39361: Improper Neutralization of Inp... 🟡 CVE-2025-27533: Memory Allocation with Excessi... 🟡 CVE-2025-20980: Out-of-bounds write in libsavs... ⚠️ CVE-2025-20979: Out-of-bounds write in libsavs... 🟡 CVE-2025-20978: Improper access control in PEN... 🟢 CVE-2025-20977: Use of implicit intent for sen... 🟡 CVE-2025-20976: Out-of-bounds read in applying... 🟡 CVE-2025-20975: Improper Export of Android App... 🟡 CVE-2025-20974: Improper handling of insuffici... 🟡 CVE-2025-20973: Improper authentication in Sec... 🟡 CVE-2025-20972: Improper verification of inten... 🟡 CVE-2025-20971: Improper input validation in S... 🟡 CVE-2025-20970: Improper access control in Bix... 🟡 CVE-2025-20969: Improper input validation in S... ⚠️ CVE-2025-20968: Improper access control in Sam... 🟡 CVE-2025-20967: Improper access control in Sam... 🟡 CVE-2025-20966: Improper access control in Sam... 🟡 CVE-2025-20965: Improper handling of insuffici... 🟡 CVE-2025-20964: Out-of-bounds write in parsing... 🟡 CVE-2025-20963: Out-of-bounds write in memory ... 🟡 CVE-2025-20962: Improper handling of insuffici... 🟡 CVE-2025-20961: Improper handling of insuffici... 🟡 CVE-2025-20960: Improper handling of insuffici... 🟡 CVE-2025-20959: Use of implicit intent for sen... 🟡 CVE-2025-20958: Improper verification of inten... ⚠️ CVE-2025-20957: Improper access control in Sma... 🟡 CVE-2025-20956: Improper export of android app... 🟡 CVE-2025-20955: Improper Export of Android App... 🟡 CVE-2025-20954: Use of implicit intent for sen... 🟡 CVE-2025-20953: Improper access control in Sma... 🟡 CVE-2025-20949: Path traversal vulnerability i... 🟡 CVE-2025-20937: Out-of-bounds write in Keymast... 🟡 CVE-2025-4171: The WZ Followed Posts – Displa... ⚠️ CVE-2025-0669: Cross-Site Request Forgery (CS... 🔥 CVE-2025-0668: Improper Neutralization of Inp... ⚠️ CVE-2025-0667: Improper Neutralization of Inp... ⚠️ CVE-2025-0666: Improper Neutralization of Inp... 🟡 CVE-2024-12120: The Royal Elementor Addons and... ⚠️ CVE-2025-32405: An Out-of-bounds Write in RT-L... 🟡 CVE-2025-32404: An Out-of-bounds Write in RT-L... 🟡 CVE-2025-32403: An Out-of-bounds Write in RT-L... ⚠️ CVE-2025-32402: An Out-of-bounds Write in RT-L... 🟡 CVE-2025-32401: An Heap-based Buffer Overflow ... ⚠️ CVE-2025-32400: An Heap-based Buffer Overflow ... 🟡 CVE-2025-32399: An Unchecked Input for Loop Co... ⚠️ CVE-2025-32398: A NULL Pointer Dereference in ... ⚠️ CVE-2025-32397: An Heap-based Buffer Overflow ... ⚠️ CVE-2025-32396: An Heap-based Buffer Overflow ... 🟢 CVE-2025-1400: Out-of-bounds Read vulnerabili... 🟢 CVE-2025-1399: Out-of-bounds Read vulnerabili... 🟡 CVE-2025-3766: The Login Lockdown & Protectio... ⚠️ CVE-2025-4335: The Woocommerce Multiple Addre... 🟡 CVE-2025-4220: The Xavin's List Subpages... 🟡 CVE-2025-4055: The Multiple Post Type Order p... 🟡 CVE-2025-4054: The Relevanssi – A Better Sear... 🟡 CVE-2025-3924: The PeproDev Ultimate Profile ... ⚠️ CVE-2025-3921: The PeproDev Ultimate Profile ... 🟡 CVE-2025-3860: The CarDealerPress plugin for ... 🟡 CVE-2025-3853: The WPshop 2 – E-Commerce plug... ⚠️ CVE-2025-3852: The WPshop 2 – E-Commerce plug... 🟡 CVE-2025-3851: The Download Manager and Payme... 🔥 CVE-2025-3844: The PeproDev Ultimate Profile ... 🟡 CVE-2025-2821: The Search Exclude plugin for ... 🟡 CVE-2025-3218: IBM i 7.2, 7.3, 7.4, 7.5, and ... ⚠️ CVE-2025-0856: The PGS Core plugin for WordPr... 🔥 CVE-2025-0855: The PGS Core plugin for WordPr... ⚠️ CVE-2025-47420: 266 vulnerability in Crestron ... ⚠️ CVE-2025-0853: The PGS Core plugin for WordPr... 🔥 CVE-2025-47419: Cleartext Transmission of Sens... 🟡 CVE-2025-47418: Exposure of Sensitive Informat... 🟡 CVE-2025-46573: passport-wsfed-saml2 provides ... 🟡 CVE-2025-46572: passport-wsfed-saml2 provides ... ⚠️ CVE-2025-0649: Incorrect JSON input stringifi... 🟡 CVE-2025-47417: Exposure of Sensitive Informat... 🟡 CVE-2025-47256: Libxmp through 4.6.2 has a sta... 🔥 CVE-2024-12225: A vulnerability was found in Q... ⚠️ CVE-2025-46820: phpgt/Dom provides access to m... 🔥 CVE-2025-46816: goshs is a SimpleHTTPServer wr... 🟡 CVE-2025-4388: A reflected cross-site scripti... ⚠️ CVE-2025-46815: The identity infrastructure so... 🟡 CVE-2025-44900: In Tenda RX3 V1.0br_V16.03.13.... 🟡 CVE-2025-37730: Improper certificate validatio... 🔥 CVE-2025-25014: A Prototype pollution vulnerab... 🔥 CVE-2025-4041: In Optigo Networks ONS NC600 v... 🟡 CVE-2025-46736: Umbraco is a free and open sou... 🟢 CVE-2025-46735: Terraform WinDNS Provider allo... 🟡 CVE-2025-45250: MrDoc v0.95 and before is vuln... 🟡 CVE-2025-32022: Finit provides fast init for L... ⚠️ CVE-2025-30165: vLLM is an inference and servi... 🟡 CVE-2025-26262: An issue in the component /int... 🟡 CVE-2025-22476: Dell Storage Center - Dell Sto... 🟡 CVE-2025-4384: The MQTT add-on of PcVue fails... ⚠️ CVE-2025-4368: A vulnerability, which was cla... 🟡 CVE-2025-4363: A vulnerability, which was cla... 🟡 CVE-2025-45492: Netgear EX8000 V1.0.0.126 is v... 🟡 CVE-2025-45490: Linksys E5600 v1.1.0.26 was di... 🟡 CVE-2025-45489: Linksys E5600 v1.1.0.26 was di... 🟡 CVE-2025-45488: Linksys E5600 v1.1.0.26 was di...
Hackers Leak Configurations and VPN Credentials for 15,000 FortiGate Devices

Hackers Leak Configurations and VPN Credentials for 15,000 FortiGate Devices

A newly formed hacking group, the Belsen Group, has released a trove of sensitive data from more than 15,000 FortiGate devices. This data includes device configurations and VPN credentials, posing significant security risks to affected organizations.

Details of the Breach

The leaked data encompasses:

  • Device configurations
  • VPN credentials
  • Other sensitive information

This exposure could allow threat actors to gain unauthorized access to corporate networks, leading to potential data breaches and other malicious activities.

Impacted Devices

The leak affects over 15,000 FortiGate devices worldwide. Organizations using these devices should assess their exposure and take immediate action to mitigate potential risks.

Recommended Actions

To safeguard your network, consider the following steps:

  • Change all VPN credentials associated with FortiGate devices.
  • Review and update device configurations to ensure they adhere to security best practices.
  • Monitor network traffic for unusual activity that may indicate unauthorized access.
  • Apply the latest firmware updates and patches to FortiGate devices.

Conclusion

This incident underscores the importance of robust security measures and regular audits of network devices. Organizations should remain vigilant and proactive in protecting their infrastructure from emerging threats.

Sources

Back to Posts