Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

KRVTZ-NET IDS alerts for 2026-02-14

0
Low
Published: Sat Feb 14 2026 (02/14/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

The KRVTZ-NET IDS alerts from February 14, 2026, indicate ongoing reconnaissance activity targeting Fortinet Fortigate VPN devices, specifically exploiting the CVE-2023-27997 vulnerability. Attackers are performing repeated GET requests to the /remote/logincheck endpoint, attempting to bypass authentication mechanisms. The reconnaissance is conducted by automated HTTP User-Agent scanners, with identified IP addresses linked to scanning and exploit attempts. No active exploitation or ransomware campaigns have been reported yet, but the reconnaissance phase is critical as it precedes potential attacks. Fortigate VPN devices are widely used in enterprise and government networks, making this threat relevant to organizations relying on these appliances for secure remote access. There is currently no patch available for this vulnerability, increasing the importance of detection and mitigation. The threat is assessed as low severity by the source, but considering the vulnerability and reconnaissance activity, the overall risk is medium. Key mitigation strategies include network segmentation, strict access controls, monitoring, and applying Fortinet's hardening guidelines.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 20:04:21 UTC

Technical Analysis

The KRVTZ-NET IDS alerts dated February 14, 2026, highlight reconnaissance activities targeting Fortinet Fortigate VPN devices by exploiting the CVE-2023-27997 vulnerability. This vulnerability involves repeated GET requests to the /remote/logincheck endpoint, which can be abused to bypass authentication mechanisms on the VPN appliance. The reconnaissance is carried out by automated scanners identified by their HTTP User-Agent strings, with IP addresses such as 167.94.146.49, 206.168.34.198, and 2001:470:1:c84::13 observed performing these scans. The IPv6 address is specifically linked to exploit attempts against the Fortigate VPN. Although no active exploitation or ransomware campaigns have been reported, reconnaissance is a critical early phase in the attack lifecycle that can lead to unauthorized access if successful. The absence of available patches for CVE-2023-27997 means organizations must rely on network monitoring, access restrictions, and configuration hardening to mitigate risk. Fortigate VPN appliances are widely deployed in enterprise, government, and critical infrastructure sectors, making this reconnaissance relevant globally. The CIRCL OSINT feed provides indicators of compromise (IOCs) including IP addresses for detection and blocking. The threat intelligence underscores the importance of early detection and proactive defense to prevent exploitation. The source rates the severity as low, but the overall risk considering the vulnerability and reconnaissance activity is medium.

Potential Impact

If exploited, CVE-2023-27997 could allow attackers to bypass authentication on Fortigate VPN appliances, granting unauthorized access to internal corporate networks. This unauthorized access could lead to data exfiltration, lateral movement within networks, and disruption of critical services, impacting confidentiality, integrity, and availability. The immediate impact of the reconnaissance activity is low; however, successful exploitation could severely affect organizations relying on Fortigate VPN for secure remote access, including enterprises, government agencies, and critical infrastructure sectors. The lack of patches increases the risk, forcing reliance on detection and mitigation strategies. Sectors with high VPN usage such as finance, healthcare, and public administration are particularly vulnerable. The broad geographic distribution of scanning IPs suggests a wide targeting scope, potentially affecting multiple countries. The strategic importance of secure VPN access in hybrid work environments amplifies the threat. Failure to detect and respond to reconnaissance could enable attackers to exploit the vulnerability at scale, leading to significant operational and data security consequences.

Mitigation Recommendations

1. Implement strict network segmentation to isolate Fortigate VPN appliances from general network traffic, minimizing exposure to scanning and exploitation attempts. 2. Deploy and maintain up-to-date intrusion detection and prevention systems (IDS/IPS) configured to detect scanning and exploitation attempts, using the provided IP indicators (e.g., 167.94.146.49, 206.168.34.198, 2001:470:1:c84::13) for blocking and alerting. 3. Continuously monitor VPN logs and network traffic for repeated or anomalous requests to /remote/logincheck and other sensitive endpoints to identify reconnaissance activity early. 4. Apply Fortinet's recommended security configurations and hardening guidelines, including disabling unnecessary services and enforcing strong authentication mechanisms such as multi-factor authentication (MFA). 5. Restrict access to VPN management interfaces to trusted IP addresses only, reducing the attack surface. 6. Conduct regular vulnerability assessments and penetration testing focused on VPN infrastructure to identify and remediate weaknesses proactively. 7. Establish and rehearse incident response procedures specifically addressing VPN-related threats to enable rapid containment and recovery. 8. Engage with Fortinet support and monitor security advisories to stay informed about any forthcoming patches or mitigations for CVE-2023-27997. 9. Educate network and security teams on reconnaissance indicators and the importance of early detection and response. 10. Consider deploying web application firewalls (WAF) or reverse proxies to filter and block malicious requests targeting VPN endpoints.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
4b924950-2db4-4c18-a6c8-0e1cabafe046
Original Timestamp
1771030235

Indicators of Compromise

Ip

ValueDescriptionCopy
ip167.94.146.49
- i Censys - HTTP User-Agent Scanner
ip206.168.34.198
- i Censys - HTTP User-Agent Scanner
ip2001:470:1:c84::13
ET EXPLOIT Fortigate VPN - Repeated GET Requests to /remote/logincheck (CVE-2023-27997)

Threat ID: 698ff083c9e1ff5ad817a9b3

Added to database: 2/14/2026, 3:48:19 AM

Last enriched: 3/13/2026, 8:04:21 PM

Last updated: 4/5/2026, 11:02:42 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses