<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>EPati — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/epati/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 13:03:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/epati/feed.xml" rel="self" type="application/rss+xml"/><item><title>ePati Antikor NGFW 2.0.1301 Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-epati-antikor-auth-bypass/</link><pubDate>Thu, 14 May 2026 13:03:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-epati-antikor-auth-bypass/</guid><description>A public exploit has been published for ePati Antikor NGFW 2.0.1301, exploiting an authentication bypass vulnerability, increasing the risk to unpatched systems.</description><content:encoded><![CDATA[<p>A public webapps exploit has been published on Exploit-DB for ePati Antikor NGFW 2.0.1301, demonstrating an authentication bypass vulnerability (EDB-52562). The availability of a working exploit significantly elevates the risk for unpatched systems, as attackers can potentially gain unauthorized access to the NGFW&rsquo;s administrative interface and sensitive data. This exploit allows attackers to bypass authentication mechanisms, potentially leading to complete compromise of the affected system. Defenders need to prioritize patching or implementing mitigations to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable ePati Antikor NGFW 2.0.1301 instance exposed to the network.</li>
<li>Attacker crafts a malicious HTTP request leveraging the authentication bypass vulnerability.</li>
<li>The crafted request is sent to the target NGFW instance.</li>
<li>The NGFW fails to properly validate the attacker&rsquo;s identity due to the authentication bypass.</li>
<li>The attacker gains unauthorized access to the administrative interface.</li>
<li>The attacker modifies firewall rules to allow malicious traffic.</li>
<li>The attacker gains access to sensitive network data and configurations.</li>
<li>The attacker may install backdoors or further compromise internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass authentication and gain unauthorized access to the ePati Antikor NGFW 2.0.1301. This can lead to complete compromise of the firewall, allowing attackers to modify firewall rules, gain access to sensitive network data, and potentially pivot to internal systems. The impact includes data breaches, network disruptions, and further compromise of the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided in this brief to your SIEM to detect exploitation attempts against ePati Antikor NGFW (rule: &ldquo;Detect ePati Antikor NGFW Authentication Bypass Attempt&rdquo;).</li>
<li>Analyze web server logs for suspicious requests targeting the ePati Antikor NGFW administrative interface to identify potential exploitation attempts.</li>
<li>Upgrade ePati Antikor NGFW to a patched version that addresses the authentication bypass vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>webapps</category></item></channel></rss>