Monday, June 16, 2025

Windows SMB Client Elevation of Privilege Vulnerability - CVE-2025-33073 - actively exploited in the wild

You may know the CVE-2025-33073 being reported actively exploited in the wild now.
Exploitation depends on two key conditions:







Print Friendly and PDF
Share/Bookmark

Wednesday, June 11, 2025

Azure AD Connect 2.0 change proxy setting

 1. Go to the program files -> Microsoft Azure Active Directory Connect -> To modify the file proxy config in the file "Microsoft.ApplicationProxy.Connector.Common.dll.config

2. Netsh winhttp set proxy "<proxy IP>"

3. Restart the service "Microsoft Azure AD Sync"

Then, you can run the powershell command >Start-ADSyncSyncCycle -PolicyType Initial 

To use the new proxy for the sync.

Print Friendly and PDF
Share/Bookmark

Fortinet SSL VPN customers need to be aware - Gradually transition to ZTNA while maintaining operational stability

Background on SSL VPN Deprecation in FortiOS 7.6.3
Fortinet has been advancing its Zero Trust Architecture (ZTA) strategy since 2022, introducing key Zero Trust Network Access (ZTNA) features in FortiOS 7.0. Recent versions like 7.6.3 may further prioritize ZTNA over SSL VPN. Fortinet has experienced numerous critical vulnerabilities in its SSL VPN functionality, most notably CVE-2024-21762, which allows unauthenticated remote code execution. These vulnerabilities, including older ones like CVE-2022-42475 and CVE-2023-27997, have been exploited by threat actors, leading to device compromise.

In FortiOS 7.6.3, Fortinet has deprecated and removed SSL VPN tunnel mode on all FortiGate models. This means that SSL VPN tunnel mode is no longer supported in the GUI or CLI, and existing SSL VPN configurations will not be upgraded. Users must migrate to IPsec VPN to maintain secure remote connectivity or change to use ZTNA.

If you decided to stay at FortiOS 7.4.x, it will reach end of support (EOS) on 11 May 2026. In the meantime, if you are E-series Fortigate users, you may also plan for replace your hardware to G-series when you plan for your FortiOS 7.6 journey with ZTNA.

Strategic Need to Migrate to Zero Trust (ZTNA)
Fortinet's Zero Trust Direction
  • FortiOS 7.0+ integrates ZTNA with FortiClient agents, FortiAuthenticator, and FortiOS application gateways for granular access control.
  • ZTNA aligns with hybrid cloud and SaaS environments, reducing attack surfaces compared to SSL VPN's "trusted perimeter" (Trust, but verify) model.
Technical Rationale for Transition
  • Enhanced Security : ZTNA enforces "never trust, always verify," mitigating lateral movement risks from compromised endpoints or outdated SSL configurations.
  • Performance Gains : ZTNA leverages SASE architecture, enabling low-latency, distributed access without complex tunnel management.

Options:
Short Term:

Long Term:

Reference:
For v7.6 until v7.6.2, models with 2GB or less RAM, SSL VPN web and tunnel mode are removed from the GUI and CLI. See SSL VPN to dial-up VPN migration - FortiGate 7.4.6 administration guide.
For v7.6.3 and later, tunnel mode will be removed, and web mode only works for other devices, see Migration from SSL VPN tunnel mode to IPsec VPN 7.6.3 - FortiGate 7.6.0 new features.

Print Friendly and PDF
Share/Bookmark