PatchSiren cyber security CVE debrief
CVE-2018-13379 Fortinet CVE debrief
CVE-2018-13379 is a Fortinet FortiOS SSL VPN path traversal vulnerability that CISA lists in its Known Exploited Vulnerabilities catalog. Because the official metadata also marks it as associated with known ransomware campaign use, defenders should treat exposed FortiOS SSL VPN deployments as a high-priority remediation item.
- Vendor
- Fortinet
- Product
- FortiOS
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2021-11-03
- Original CVE updated
- 2021-11-03
- Advisory published
- 2021-11-03
- Advisory updated
- 2021-11-03
Who should care
Fortinet FortiOS administrators, SOC teams, and incident responders responsible for internet-facing SSL VPN services should prioritize this issue.
Technical summary
The supplied source corpus identifies the vulnerability as a FortiOS SSL VPN path traversal issue. CISA’s KEV entry indicates it is known to be exploited in the wild, and the metadata flags known ransomware campaign use. The corpus does not provide affected versions or deeper exploit details, so defensive action should follow vendor guidance and focus on rapid remediation and exposure review.
Defensive priority
Critical for any FortiOS SSL VPN deployment exposed to the internet; treat as a top remediation priority because CISA lists it as known exploited.
Recommended defensive actions
- Apply Fortinet updates and follow the vendor’s remediation guidance referenced by CISA.
- Identify all FortiOS SSL VPN instances, especially those reachable from the internet, and prioritize them for patching.
- Review authentication and VPN access logs for suspicious activity around the exposure window.
- If patching cannot be completed immediately, implement compensating controls that reduce external exposure until remediation is finished.
Evidence notes
This debrief is based only on the supplied CISA KEV metadata and the official CVE/NVD links in the source corpus. The corpus confirms the vulnerability name, KEV status, known ransomware campaign use, and the vendor-directed remediation note. It does not include affected versions, exploitation steps, or CVSS data.
Official resources
-
CVE-2018-13379 CVE record
CVE.org
-
CVE-2018-13379 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
CISA added this vulnerability to the Known Exploited Vulnerabilities catalog on 2021-11-03 and marked it as known ransomware campaign use.