Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

KRVTZ-NET IDS alerts for 2026-02-23

0
Low
Published: Mon Feb 23 2026 (02/23/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

The KRVTZ-NET IDS alerts dated 2026-02-23 report reconnaissance activity targeting Fortigate VPN devices, specifically repeated GET requests to the /remote/logincheck endpoint associated with CVE-2023-27997. This vulnerability allows unauthenticated attackers to bypass authentication and potentially execute arbitrary commands. The alerts also include scanning attempts to access hidden environment files and PHP info pages, common techniques to gather sensitive configuration data. No active exploitation or ransomware campaigns are currently linked to these activities, and no patches are available at the time of reporting. The threat is categorized as low severity and primarily represents scanning and reconnaissance efforts. The presence of IPv4 and IPv6 addresses from diverse global sources indicates a broad scanning campaign. Organizations using Fortigate VPNs should monitor for these indicators and apply mitigation strategies to prevent potential exploitation. The threat affects countries with significant Fortigate VPN deployments and critical infrastructure reliance on these devices.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 20:00:08 UTC

Technical Analysis

The KRVTZ-NET IDS alerts from February 23, 2026, highlight network reconnaissance activities detected by intrusion detection systems focusing on Fortigate VPN devices. The primary technical detail involves multiple IP addresses performing repeated GET requests to the /remote/logincheck endpoint, which is linked to CVE-2023-27997, a vulnerability that enables unauthenticated attackers to bypass authentication mechanisms and potentially execute arbitrary commands on affected Fortigate VPN devices. These repeated requests suggest active scanning or exploitation attempts. Additional indicators include inbound requests to hidden environment files and access attempts to web server PHP info pages, which are reconnaissance techniques used to gather sensitive configuration and environment information. The alerts are classified as low severity and fall within the reconnaissance phase of the cyber kill chain. No patches or firmware updates are available at the time of reporting, and there are no known exploits actively used in the wild. The scanning activity involves both IPv4 and IPv6 addresses from diverse geographic locations, indicating a broad and global scanning effort. Although no direct impact or affected versions are specified, the association with CVE-2023-27997 underscores the importance of securing Fortigate VPN endpoints. The feed originates from CIRCL OSINT and is tagged for automated unsupervised processing, emphasizing the need for continuous monitoring and integration of threat intelligence to detect and respond to emerging threats.

Potential Impact

The primary impact of this threat is the reconnaissance and scanning activity that precedes potential exploitation attempts. If attackers successfully exploit CVE-2023-27997 on Fortigate VPN devices, they could bypass authentication controls, leading to unauthorized access to internal networks, data exfiltration, and further compromise of network infrastructure. This could severely affect the confidentiality, integrity, and availability of critical systems, especially for organizations relying on Fortigate VPNs for secure remote access. The reconnaissance activity also increases the risk of targeted attacks by revealing system configurations and vulnerabilities. Although no active exploitation or ransomware campaigns are currently linked to these alerts, the scanning activity indicates preparation for future attacks. The low severity rating and absence of known exploits in the wild mitigate immediate risk, but unpatched systems remain vulnerable. The global distribution of scanning IPs suggests a widespread threat landscape, with higher risk in countries with extensive Fortigate VPN deployments and critical infrastructure dependent on these devices.

Mitigation Recommendations

1. Verify and apply all available patches and firmware updates for Fortigate VPN devices immediately to address CVE-2023-27997. 2. Restrict access to VPN management interfaces by implementing strict network segmentation and limiting exposure to the internet. 3. Deploy and fine-tune intrusion detection and prevention systems to detect and block repeated unauthorized requests to /remote/logincheck and other suspicious endpoints. 4. Monitor VPN logs closely for unusual authentication attempts, repeated login failures, or other indicators of brute force or exploitation attempts. 5. Limit access to sensitive web server files such as environment configuration files and phpinfo pages by enforcing least privilege principles and disabling unnecessary services. 6. Enforce multi-factor authentication (MFA) for VPN access to reduce the risk of credential compromise. 7. Conduct regular vulnerability assessments and penetration testing focused on VPN infrastructure to identify and remediate weaknesses. 8. Integrate threat intelligence feeds like CIRCL OSINT into security monitoring platforms to stay informed about emerging reconnaissance and exploitation trends. 9. Train network and security teams on recognizing indicators of compromise related to CVE-2023-27997 and reconnaissance activities to improve incident response readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
ba6eb2c8-966a-4aa9-891a-491968e19b68
Original Timestamp
1771836904

Indicators of Compromise

Ip

ValueDescriptionCopy
ip2001:470:1:fb5:1e78:6c5e:1f47:8a54
ET EXPLOIT Fortigate VPN - Repeated GET Requests to /remote/logincheck (CVE-2023-27997)
ip2602:f915:e:c26f::1
ET INFO Request to Hidden Environment File - Inbound
ip2001:470:1:c84::12
ET EXPLOIT Fortigate VPN - Repeated GET Requests to /remote/logincheck (CVE-2023-27997)
ip110.93.150.104
ET SCAN Naver Webcrawler User-Agent (Naver.me)
ip20.5.80.84
ET WEB_SERVER WEB-PHP phpinfo access

Threat ID: 699c2ff9be58cf853b75cfa7

Added to database: 2/23/2026, 10:46:17 AM

Last enriched: 3/13/2026, 8:00:08 PM

Last updated: 4/9/2026, 2:06:23 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses