What do you need help with?

We are here and ready to help.
Email: servicedesk@socfortress.co

Fortinet - Detection Rules

Fortinet - Detection Rules

Intro

Detection Rules for Fortinet Firewalls


Rule: FortiGate FortiWeb Path Traversal Vulnerability Exploitation Attempt

Severity

High

Detection Details

Detects potential exploitation attempts targeting CVE-2025-64446, a critical path traversal vulnerability affecting Fortinet FortiWeb Web Application Firewalls (WAF).
An adversary can abuse this flaw, which requires no authentication, to create new, unauthorized administrative user accounts on the exposed device.
This provides the threat actor with full administrative control over the security appliance, allowing them to bypass security policies, neutralize the WAF, and establish a persistent backdoor for further network intrusions.

Mitre ID

Discovery (T1083)

Graylog Query

syslog_type:fortinet AND httpmethod:POST AND !action:blocked AND !action:block AND !action:reset AND !action:drop AND !action:dropped AND (url:/\/system\/admin%3F/ OR url:/\/cgi\-bin\/fwbcgi/)

Rule: FortiGate WIDS Wireless Valid Client Misassociation Detected

Severity

High

Detection Details

Detects when FortiGate Wireless IDS identifies an incident where a legitimate wireless client associates with a rogue or unauthorized access point (AP), a behavior known as valid client misassociation.
Attackers may set up malicious APs to impersonate trusted networks, tricking legitimate clients into connecting.
This tactic is commonly used in evil twin attacks to intercept traffic, harvest credentials, or inject malicious payloads. Identifying such associations is essential to safeguarding wireless network integrity and preventing data leakage.

Mitre ID

Credential Access (T1557)
Credential Access (T1040)
Resource Development (T1584)

Graylog Query

syslog_type:fortinet AND logdesc:"Wireless valid_client_misassoc detected"

Rule: FortiGate WIDS Wireless Management Flooding Detected

Severity

High

Detection Details

Detects when FortiGate Wireless IDS identifies abnormal surges of wireless management frames, such as authentication, association, or probe requests, which may indicate a management frame flooding attack.
Adversaries use this technique to disrupt wireless network operations, exhaust access point resources, or perform denial-of-service (DoS) attacks.
Continuous monitoring of management frame activity helps with the early identification and mitigation of wireless network disruptions.

Mitre ID

Impact (T1498)
Resource Development (T1584)

Graylog Query

syslog_type:fortinet AND logdesc:"Wireless management flooding detected"

Rule: FortiGate WIDS Wireless EAPOL Packet Flooding Detected

Severity

High

Detection Details

Detects a flood of EAPOL (Extensible Authentication Protocol over LAN) packets on the wireless network identified by FortiGate Wireless IDS.
Such flooding can exhaust network resources, disrupt normal authentication processes, or exploit weaknesses in WPA/WPA2 handshakes.
Monitoring for this behavior is crucial to maintaining secure and stable wireless authentication services in enterprise environments.

Mitre ID

Impact (T1498)
Resource Development (T1584)

Graylog Query

syslog_type:fortinet AND logdesc:"Wireless EAPOL packet flooding detected"

Rule: FortiGate WIDS Rogue Access Point Detected

Severity

High

Detection Details

Detects the rogue access point (AP) in the network as reported by FortiGate Wireless IDS.
Rogue APs are unauthorized wireless access points connected to a network, often used by attackers to bypass security controls, capture sensitive data, or conduct man-in-the-middle attacks.
Detection of rogue APs is critical to maintaining wireless network integrity and preventing unauthorized access.

Mitre ID

Resource Development (T1584)
Credential Access (T1557)

Graylog Query

syslog_type:fortinet AND (logdesc:"Rogue AP detected" OR logdesc:"Rogue AP activity" OR logdesc:"Rogue AP on air" OR logdesc:"Fake AP on air" OR logdesc:"Fake AP detected" OR logdesc:"Offending AP on air" OR logdesc:"Offending AP detected")

Rule: FortiGate WIDS Wireless Long Duration Attack Detected

Severity

High

Detection Details

Detects a long duration attack on the wireless network identified by FortiGate Wireless IDS.
These attacks often involve persistent connections to rogue access points or the use of compromised clients to maintain unauthorized access over an extended period.
Such activity may be used by adversaries for sustained data exfiltration, network reconnaissance, or to establish footholds in the environment.
Monitoring these patterns is crucial to detecting stealthy and persistent wireless threats.

Mitre ID

Impact (T1498)

Graylog Query

syslog_type:fortinet AND logdesc:"Wireless long duration attack detected"

Rule: FortiGate Firewall Virus Detected

Severity

High

Detection Details

Detects the virus in the network identified by FortiGate Firewall.
This may indicate the presence of malware or a malicious file attempting to execute or transfer within the network.
Threat actors may use malware to gain access, maintain persistence, or exfiltrate data. Monitoring such events can help identify compromised systems or prevent further infection spread.

Mitre ID

Execution (T1204)

Graylog Query

syslog_type:fortinet AND subtype:"virus" AND !action:"blocked"

Rule: FortiGate WIDS Wireless Threat Detected

Severity

High

Detection Details

Detects potential wireless-based security threats as identified by FortiGate Wireless IDS.
These threats may include spoofed access points, EAPOL flooding, deauthentication attacks, or other suspicious wireless behaviors.
Monitoring such events is critical to protecting against wireless intrusion attempts, maintaining the integrity of the Wi-Fi network, and preventing unauthorized access or denial-of-service conditions caused by malicious actors.

Mitre ID

Credential Access (T1557)
Credential Access (T1040)

Graylog Query

syslog_type:fortinet AND logdesc:"Wireless threat detected"

**Rule:FortiGate WIDS Wireless Invalid MAC OUI Detected **

Severity

High

Detection Details

Detects instances where a FortiGate Wireless IDS identifies a client with an invalid or unrecognized MAC Organizationally Unique Identifier (OUI).
This may indicate the presence of unauthorized, rogue, or potentially malicious devices attempting to connect to the wireless network.
Monitoring for invalid MAC OUIs helps strengthen network access controls and prevent unauthorized access.

Mitre ID

Credential Access (T1557)

Graylog Query

syslog_type:fortinet AND logdesc:"Wireless invalid MAC OUI detected"

Rule: FortiGate WIDS Wireless Asleap Attack Detected

Severity

High

Detection Details

Detects the presence of an Asleap attack in a wireless network identified by FortiGate Wireless IDS.
Asleap is a tool used to exploit weak authentication in LEAP (Lightweight Extensible Authentication Protocol), potentially allowing attackers to capture and crack wireless credentials.
Monitoring for this activity helps identify unauthorized attempts to compromise wireless network security and protect sensitive credentials.

Mitre ID

Credential Access (T1110)

Graylog Query

syslog_type:fortinet AND logdesc:"Wireless Asleap attack detected"

Rule: FortiGate IPS Malicious URL Detected

Severity

High

Detection Details

Detects when FortiGate Intrusion Prevention System (IPS) identifies access to a known malicious URL.
This activity may indicate attempts to connect to command and control infrastructure, deliver malware, or exfiltrate data.
Monitoring these detections helps identify potential threats, prevent compromise, and maintain network security.

Mitre ID

Execution (T1204)
Initial Access (T1566)
Command and Control (T1071)

Graylog Query

syslog_type:fortinet AND subtype:"ips" AND attack:"malicious-url" AND action:"detected"

Rule: FortiGate IPS Botnet Activity Detected

Severity

High

Detection Details

Detects botnet-related activity identified by FortiGate Intrusion Prevention System (IPS). This may indicate that a host within the network is communicating with known botnet command and control servers or exhibiting behavior consistent with botnet infections. Monitoring these events helps identify compromised systems, prevent data exfiltration, and mitigate the spread of malicious activity within the environment.

Mitre ID

Command and Control (T1071)
Resource Development (T1584)

Graylog Query

syslog_type:fortinet AND subtype:"ips" AND attack:"botnet" AND action:"detected"

Rule: FortiGate Admin User Created from Public IP

Severity

Medium

Detection Details

Detects the creation of a new administrator user account on a Fortinet FortiGate device originating from a public IP address.
An adversary who gains access to the management interface may create unauthorized admin accounts to establish persistent, privileged control over the firewall.
By creating these accounts from external or atypical network locations, attackers can maintain long-term access, modify security policies, exfiltrate sensitive data, or prepare the environment for additional malicious activity.

Mitre ID

Persistence (T1098)

Graylog Query

syslog_type:fortinet AND subtype:"system" AND logdesc:"Object attribute configured" AND action:"Add" AND cfgpath:"system.admin"

Rule: FortiGate Suspicious Config File Access from External Network

Severity

Medium

Detection Details

Detects attempts to download a FortiGate configuration file from an external or publicly accessible network source.
Adversaries may abuse this behavior to obtain sensitive configuration data, including administrative credentials, network topology details, VPN settings, or firewall policies.
Access to this information can enable further compromise through targeted lateral movement, privilege escalation, or tailored exploitation of exposed services.

Mitre ID

Collection (T1602)

Graylog Query

syslog_type:fortinet AND msg:"System config file has been downloaded" AND status:"success"

Rule: FortiGate WIDS Wireless Weak Encryption Detected

Severity

Medium

Detection Details

Detects wireless access points using weak or deprecated encryption protocols, as reported by FortiGate Wireless IDS.
Risky encryption methods, such as WEP or misconfigured WPA settings, may allow adversaries to eavesdrop on network traffic or perform cryptographic attacks to gain unauthorized access.
Identifying and remediating such vulnerabilities is essential to ensure wireless network confidentiality and compliance with security best practices.

Mitre ID

Credential Access (T1040)
Credential Access (T1557)

Graylog Query

syslog_type:fortinet AND (logdesc:"Wireless risky_encryption detected" OR logdesc:"Wireless Weak WEP IV detected")

Rule: Fortinet FortiGate Suspicious Super Admin Login Detected

Severity

Medium

Detection Details

Detects a super admin login attempt to a FortiGate firewall originating from a suspicious or public IP address.
This may indicate an attempt to exploit CVE-2025-24472 which allows unauthenticated attackers to gain super admin privileges on vulnerable FortiOS devices (<7.0.16) with exposed management interfaces.

Mitre ID

Initial Access (T1190)

Graylog Query

syslog_type:fortinet AND subtype:"system" AND logdesc:"Admin login successful" AND profile:"super_admin" AND method:"jsconsole" AND status:"success" AND srcip_reserved_ip:false

Rules Summary

Rule Name Severity Mitre
FortiGate FortiWeb Path Traversal Vulnerability Exploitation Attempt High Discovery (T1083)
FortiGate WIDS Wireless Valid Client Misassociation Detected High “Credential Access (T1557), Credential Access (T1040), Resource Development (T1584)”
FortiGate WIDS Wireless Management Flooding Detected High “Impact (T1498), Resource Development (T1584)”
FortiGate WIDS Wireless EAPOL Packet Flooding Detected High “Impact (T1498), Resource Development (T1584)”
FortiGate WIDS Rogue Access Point Detected High “Resource Development (T1584), Credential Access (T1557)”
FortiGate WIDS Wireless Long Duration Attack Detected High Impact (T1498)
FortiGate Firewall Virus Detected High Execution (T1204)
FortiGate WIDS Wireless Threat Detected High “Credential Access (T1557), Credential Access (T1040)”
FortiGate WIDS Wireless Invalid MAC OUI Detected High Credential Access (T1557)
FortiGate WIDS Wireless Asleap Attack Detected High Credential Access (T1110)
FortiGate IPS Malicious URL Detected High “Execution (T1204), Initial Access (T1566), Command and Control (T1071)”
FortiGate IPS Botnet Activity Detected High “Command and Control (T1071), Resource Development (T1584)”
FortiGate Admin User Created from Public IP Medium Persistence (T1098)
FortiGate Suspicious Config File Access from External Network Medium Collection (T1602)
FortiGate WIDS Wireless Weak Encryption Detected Medium “Credential Access (T1040), Credential Access (T1557)”
Fortinet FortiGate Suspicious Super Admin Login Detected Medium Initial Access (T1190)
Facebook Share Tweet

Was this article helpfu?

Yes No

Thank you for voting

×
Select company

You are related to multiple companies. Please select the company you wish to login as.