IronSights
All insights

threat intelligence

VPN and Firewall Vulnerabilities: Why Australian Businesses Must Patch Faster

Vulnerabilities in Fortinet, Cisco, Ivanti, and other network appliances have been among the most actively exploited in Australian business environments over the past two years. These are not theoretical risks — they are being exploited within days of disclosure.

By Ryan Balloot, Managing Director11 September 20252 min read

Network appliances — VPN gateways, firewalls, and remote access concentrators — occupy a privileged position in the network architecture. They sit at the perimeter, handling all remote access traffic. A vulnerability in one of these devices, successfully exploited, provides direct network access without requiring any user interaction or credential compromise.

The Exploitation Timeline

The ACSC has repeatedly highlighted that vulnerabilities in internet-facing network appliances are being actively exploited within 24-72 hours of public disclosure. For extreme-risk vulnerabilities — those with CVSS scores of 9.0 or above — the Essential Eight patching requirement is 48 hours. This is not conservative: it is a response to the observed exploitation timeline.

The Most Targeted Vendors

Fortinet, Ivanti, Cisco, Palo Alto Networks, and SonicWall appliances have all been subject to actively exploited vulnerabilities in the 2023-25 period. The ACSC has issued specific advisories on many of these, often noting that Australian organisations have been affected. If your network perimeter includes any of these vendors' products, active vulnerability monitoring and rapid patching are not optional.

Beyond Patching: Configuration Review

Patching addresses known vulnerabilities. Configuration review addresses the attack surface reduction that patching cannot provide. This includes: disabling management access from the internet (require VPN-in-VPN or jump host for appliance management), restricting management access to specific IP ranges, enabling logging of authentication attempts and configuration changes, and reviewing whether all enabled features and protocols are actually required.

We use a managed firewall from our ISP. Does patching apply to us?

If your ISP or managed service provider is responsible for the appliance, patching is their obligation — but you should verify it is being done and within appropriate timeframes. Request confirmation of patch cadence from your MSP and confirm that critical patches are applied within 48 hours of release. MSP contracts should specify patching SLAs for internet-facing infrastructure.

Keep reading

More from the IronSights team.