<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2023-27997 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2023-27997/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 13 Mar 2026 20:52:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2023-27997/feed.xml" rel="self" type="application/rss+xml"/><item><title>KRVTZ-NET IDS Alerts Analysis: Network Scanning and Exploitation Attempts</title><link>https://feed.craftedsignal.io/briefs/2026-03-krvtz-net-ids-alerts/</link><pubDate>Fri, 13 Mar 2026 20:52:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-krvtz-net-ids-alerts/</guid><description>Multiple IDS alerts indicate potential network reconnaissance, vulnerability exploitation attempts targeting Fortigate VPN (CVE-2023-27997), and ColdFusion servers originating from various IP addresses on March 13, 2026.</description><content:encoded>&lt;p>On March 13, 2026, KRVTZ-NET IDS systems generated a series of alerts indicative of network scanning and attempted exploitation. The alerts highlight suspicious activity originating from a range of IP addresses, suggesting a widespread campaign rather than a targeted attack from a single actor. Specific alerts include repeated GET requests to &lt;code>/remote/logincheck&lt;/code>, potentially targeting the Fortigate VPN vulnerability CVE-2023-27997, as well as requests for hidden environment files and attempts…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>network-scanning</category><category>vulnerability-exploitation</category><category>fortigate</category><category>coldfusion</category><category>cve-2023-27997</category></item><item><title>Fortigate VPN CVE-2023-27997 Exploitation Attempt</title><link>https://feed.craftedsignal.io/briefs/2026-02-fortigate-vpn-cve-2023-27997/</link><pubDate>Sat, 28 Feb 2026 00:46:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-fortigate-vpn-cve-2023-27997/</guid><description>IDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.</description><content:encoded>&lt;p>On February 28, 2026, network intrusion detection systems (IDS) flagged suspicious activity indicative of a potential exploit targeting Fortigate VPN servers. The activity involves a series of repeated GET requests directed towards the &lt;code>/remote/logincheck&lt;/code> endpoint, a known attack vector associated with CVE-2023-27997. This vulnerability allows unauthenticated attackers to execute arbitrary code via specially crafted requests. The observed traffic originates from the IPv6 address…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fortigate</category><category>vpn</category><category>cve-2023-27997</category><category>exploit</category><category>initial-access</category></item><item><title>Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent</title><link>https://feed.craftedsignal.io/briefs/2026-02-fortigate-cve-2023-27997/</link><pubDate>Thu, 26 Feb 2026 07:27:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-fortigate-cve-2023-27997/</guid><description>Multiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.</description><content:encoded>&lt;p>On February 26, 2026, network intrusion detection systems (IDS) triggered alerts related to potential exploitation attempts targeting Fortigate VPN servers. The alerts highlight suspicious network activity originating from multiple IP addresses, specifically repeated GET requests to the &lt;code>/remote/logincheck&lt;/code> endpoint, a known vulnerability associated with CVE-2023-27997. This vulnerability could allow unauthorized access to the VPN. Additionally, an IPv4 address was observed using a suspicious…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fortigate</category><category>vpn</category><category>cve-2023-27997</category><category>exploit</category><category>network</category></item></channel></rss>