fortinet_management_external_internal

Explanation

This event is triggered by Netography's Fusion Portal when it detects traffic on TCP port 541 leaving your network. This return traffic indicates that there may have been an external attacker that communicated with an internal device that had port 541 exposed. The attacker could then execute arbitrary code or commands on the internal device via specially crafted requests (see CVE-2024-47575) if FortiManager was running on the internal device.

This does not necessarily mean that you have been compromised, however we strongly recommend that you block inbound connections to port 541 on your firewall especially if you have FortiManager running on exposed devices.

What to Look For

For vulnerable FortiManager devices, consult the manufacturer's indicator of compromise guide and follow prescribed recovery steps if needed.

Related MITRE ATT&CK Categories

External Remote Services, Technique T1133 - Enterprise

Exploit Public-Facing Application, Technique T1190 - Enterprise