PatchSiren

PatchSiren cyber security CVE debrief

CVE-2018-13379 Fortinet CVE debrief

CVE-2018-13379 is a Fortinet FortiOS SSL VPN path traversal vulnerability that CISA lists in its Known Exploited Vulnerabilities catalog. Because the official metadata also marks it as associated with known ransomware campaign use, defenders should treat exposed FortiOS SSL VPN deployments as a high-priority remediation item.

Vendor
Fortinet
Product
FortiOS
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2021-11-03
Original CVE updated
2021-11-03
Advisory published
2021-11-03
Advisory updated
2021-11-03

Who should care

Fortinet FortiOS administrators, SOC teams, and incident responders responsible for internet-facing SSL VPN services should prioritize this issue.

Technical summary

The supplied source corpus identifies the vulnerability as a FortiOS SSL VPN path traversal issue. CISA’s KEV entry indicates it is known to be exploited in the wild, and the metadata flags known ransomware campaign use. The corpus does not provide affected versions or deeper exploit details, so defensive action should follow vendor guidance and focus on rapid remediation and exposure review.

Defensive priority

Critical for any FortiOS SSL VPN deployment exposed to the internet; treat as a top remediation priority because CISA lists it as known exploited.

Recommended defensive actions

  • Apply Fortinet updates and follow the vendor’s remediation guidance referenced by CISA.
  • Identify all FortiOS SSL VPN instances, especially those reachable from the internet, and prioritize them for patching.
  • Review authentication and VPN access logs for suspicious activity around the exposure window.
  • If patching cannot be completed immediately, implement compensating controls that reduce external exposure until remediation is finished.

Evidence notes

This debrief is based only on the supplied CISA KEV metadata and the official CVE/NVD links in the source corpus. The corpus confirms the vulnerability name, KEV status, known ransomware campaign use, and the vendor-directed remediation note. It does not include affected versions, exploitation steps, or CVSS data.

Official resources

CISA added this vulnerability to the Known Exploited Vulnerabilities catalog on 2021-11-03 and marked it as known ransomware campaign use.