fortinet_management_internal_internal

Explanation

This event is triggered by Netography's Fusion Portal when it detects traffic from TCP port 541 on your network. This return traffic indicates that there may have been an internal attacker that communicated with an internal device that had port 541 exposed. The attacker could then execute arbitrary code or commands on the internal device via specially crafted requests (see CVE-2024-47575) if FortiManager was running on the internal device.

This does not necessarily mean that you have been compromised, nor that your internal devices with port 541 open are vulnerable, however we recommend that you look into why port 541 is open on the affected devices and if the device is running a vulnerable version of FortiManager, follow the manufacturer's workaround or upgrade recommendations.

What to Look For

For vulnerable FortiManager devices, consult the manufacturer's indicator of compromise guide and follow prescribed recovery steps if needed.

Related MITRE ATT&CK Categories

External Remote Services, Technique T1133 - Enterprise

Exploit Public-Facing Application, Technique T1190 - Enterprise