fortinet_management_internal_internal
Explanation
This event is triggered by Netography's Fusion Portal when it detects traffic from TCP port 541 on your network. This return traffic indicates that there may have been an internal attacker that communicated with an internal device that had port 541 exposed. The attacker could then execute arbitrary code or commands on the internal device via specially crafted requests (see CVE-2024-47575) if FortiManager was running on the internal device.
This does not necessarily mean that you have been compromised, nor that your internal devices with port 541 open are vulnerable, however we recommend that you look into why port 541 is open on the affected devices and if the device is running a vulnerable version of FortiManager, follow the manufacturer's workaround or upgrade recommendations.
What to Look For
For vulnerable FortiManager devices, consult the manufacturer's indicator of compromise guide and follow prescribed recovery steps if needed.
Related MITRE ATT&CK Categories
External Remote Services, Technique T1133 - Enterprise
Exploit Public-Facing Application, Technique T1190 - Enterprise
Updated 20 days ago