This is a news story, published by Ars Technica, that relates primarily to Fortinet news.
For more operating systems news, you can click here:
more operating systems newsFor more news from Ars Technica, you can click here:
more news from Ars TechnicaOtherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best tech news, business news, entertainment news, and much more. If you like this article about operating systems, you might also like this article about
Chinese state hackers. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest security vulnerabilities news, vulnerabilities news, news about operating systems, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
vulnerabilityArs Technica
•80% Informative
Dutch officials say Chinese hackers have used critical vulnerability to infect more than 20,000 VPN appliances sold by Fortinet .
The vulnerability, tracked as CVE-2022-42475 , is a heap-based buffer overflow that allows hackers to remotely execute malicious code.
Fortinet silently fixed the vulnerability on November 28, 2022 , but failed to mention the threat until December 12, 2023 .
Dutch officials first reported in February that Chinese state hackers had exploited the vulnerability to install an advanced and stealthy backdoor on Fortigate appliances inside the Dutch Ministry of Defence .
VR Score
79
Informative language
78
Neutral language
39
Article tone
formal
Language
English
Language complexity
70
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
short-lived
External references
4
Source diversity
3
Affiliate links
no affiliate links