WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships FBI and CISA Advisory: APT Actors Exploiting FortiOS Vulnerabilities to Gain Initial Access for Future Attacks
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

FBI and CISA Advisory: APT Actors Exploiting FortiOS Vulnerabilities to Gain Initial Access for Future Attacks

Author: Charles Egli

Created: Friday, April 2, 2021 - 17:54

Categories: Cybersecurity

Today the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI published a Cybersecurity Advisory stating that advanced persistent threat (APT) actors are engaged in activities to exploit Fortinet FortiOS vulnerabilities to gain initial access to government, commercial, and technology services networks for future attacks. The advisory notes that APT actors have historically exploited critical vulnerabilities to conduct attacks that include distributed denial-of-service (DDoS), ransomware, structured query language (SQL) injection, spearphishing, website defacement, and disinformation.

Access the Cybersecurity Advisory below.

Mitigation Recommendations
The FortiOS vulnerabilities include CVE-2018-13379, CVE-2020-12812, and CVE-2019-5591. For organizations that use FortiOS, the advisory recommends they immediately patch these CVEs. For organizations that do not use FortiOS, it recommends they add key artifact files used by FortiOS to their execution deny list and that they prevent any attempts to install or run this program and its associated files. The advisory’s mitigations section lists other recommendations highlighting security best practices in light of this activity.

Next Steps
CISA and the FBI encourage partners contribute any information they may have related to this threat. To report intrusions or request incident response or technical assistance, they can contact CISA at 888-282-0870 or ce*****@**sa.gov or the FBI through their local field office.

WaterISAC also encourages members to share information and report incidents by emailing an*****@*******ac.org, calling 866-H20-ISAC, or using the online incident reporting form. WaterISAC will continue to share information with its members and partners as more is learned.

Attached Files:

CISA FBI CSA - APT Actors Exploiting FortiOS Vulnerabilities

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar