T1190 is the technical counterpart to T1566 (Phishing). Where phishing exploits human trust, T1190 exploits software vulnerabilities. Both serve the same tactical objective — Initial Access — but T1190 is often more dangerous because it can be automated at scale, requires no victim interaction, and frequently targets devices that lack endpoint detection and response (EDR) coverage. Firewalls, VPN concentrators, load balancers, and industrial controllers operate at the network edge where visibility is limited and patching is slow.
The Verizon 2025 DBIR found that basic web application attacks accounted for 12% of all data breaches, making exploitation of public-facing applications one of the top initial access patterns in enterprise environments. The technique is used by both financially motivated ransomware operators looking for quick entry and nation-state actors who target edge infrastructure specifically because it lacks the monitoring capabilities of internal endpoints.
How Public-Facing Application Exploitation Works
The attack begins with reconnaissance. Adversaries scan the internet for exposed services using tools like Shodan, Censys, Masscan, and Nuclei. They identify specific software versions, enumerate exposed management interfaces, and map the attack surface of target organizations. Automated scanners can probe hundreds of thousands of hosts for a specific CVE within hours of a vulnerability disclosure.
Once a vulnerable target is identified, the attacker crafts and delivers an exploit. This could be a specially formed HTTP request that triggers a buffer overflow in a web server, a serialized object that exploits a deserialization flaw in a Java application, a SQL injection payload that extracts data or executes operating system commands, or a crafted authentication request that bypasses access controls on a VPN gateway. The exploit achieves one of several outcomes: arbitrary code execution, authentication bypass, file read/write, or privilege escalation.
After successful exploitation, the attacker establishes persistence — typically by deploying a web shell (T1505.003), creating a new administrative account, or installing a reverse shell that connects back to attacker infrastructure. From the compromised internet-facing system, the adversary pivots into the internal network, harvesting credentials, mapping infrastructure, and moving laterally toward high-value targets.
What Gets Targeted
The range of systems targeted under T1190 is broad, but several categories are disproportionately exploited:
VPN and Remote Access Gateways
VPN appliances from Fortinet, Ivanti (Pulse Secure), Citrix, and Cisco are among the most frequently exploited edge devices. They sit at the network boundary, handle authentication traffic, and often have direct connectivity to internal network segments. A compromised VPN gateway gives an attacker the same network access as a legitimate remote employee — often without triggering any alarms because VPN traffic is expected. Volt Typhoon, APT5, and multiple ransomware groups have targeted VPN appliances as their preferred initial access vector.
Email Servers
Microsoft Exchange Server has been one of the most heavily targeted applications in recent years. The ProxyLogon (CVE-2021-26855) and ProxyShell (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) vulnerability chains allowed attackers to achieve unauthenticated remote code execution on Exchange servers, leading to mass exploitation by HAFNIUM and numerous other groups. Exchange servers are high-value targets because they contain sensitive communications and often have elevated privileges within Active Directory environments.
Firewalls and Network Appliances
Firewalls are paradoxically both security devices and attack surfaces. When a firewall has a vulnerability in its management interface — as has been the case with multiple FortiGate, Palo Alto, and SonicWall vulnerabilities — the device meant to protect the network becomes the entry point. These devices typically lack EDR agents, have limited logging capabilities compared to endpoints, and run proprietary operating systems that defenders have less visibility into.
Related: Why Did the Attacker Scan Those Specific Ports? The FortiGate Port Targeting Strategy
Web Applications and APIs
Custom web applications, content management systems, and APIs exposed to the internet are vulnerable to the OWASP Top 10 and CWE Top 25 weakness categories — SQL injection, cross-site scripting, insecure deserialization, broken access control, server-side request forgery (SSRF), and authentication bypasses. Unlike vendor appliances where patches are distributed centrally, custom applications require organizations to identify and remediate vulnerabilities themselves.
Industrial Control Systems (ICS)
Operational technology systems with internet-accessible interfaces represent critical targets. Programmable logic controllers (PLCs), SCADA systems, and human-machine interfaces (HMIs) often run legacy software with known vulnerabilities and limited authentication mechanisms. The consequences of exploitation extend beyond data theft to physical safety — compromised ICS systems can disrupt power grids, water treatment facilities, and manufacturing processes.
Related: CVE-2021-22681 — The Unpatchable Rockwell Logix Flaw on CISA's Active Exploitation List
Real-World Case Studies
FortiGate Mass Exploitation Campaign (2024–2025)
A single threat actor or small group compromised over 600 enterprise FortiGate firewalls across 38 days by scanning four specific management ports: 443, 8443, 10443, and 4443. These ports were not random — they represent the default and commonly reconfigured ports that administrators predictably use for FortiGate management interfaces. The campaign exploited known authentication bypass vulnerabilities in FortiOS to gain access to firewall management consoles, from which attackers extracted configurations, VPN credentials, and network topology data. The campaign demonstrated how predictable administrative choices create exploitable patterns at scale.
Related: Full analysis of the FortiGate port targeting strategy
BeyondTrust CVE-2026-1731 — WebSocket Exploitation
A critical vulnerability in BeyondTrust's Privileged Remote Access product exposed a WebSocket endpoint that attackers exploited to deploy backdoors, exfiltrate databases, and stage ransomware. The vulnerability was exploited twice — the same architectural weakness was leveraged by different threat actors months apart. The case demonstrated how a single vulnerability in a privileged access management tool can provide attackers with direct access to the administrative layer that controls access to everything else in the environment.
Related: The Same Door, Kicked Open Twice — CVE-2026-1731 and the BeyondTrust Exploitation Campaign
HAFNIUM and ProxyLogon — Exchange Server Mass Exploitation
In early 2021, HAFNIUM (a China-linked threat group) exploited four zero-day vulnerabilities in Microsoft Exchange Server to compromise tens of thousands of organizations worldwide. The attack chain allowed unauthenticated attackers to read emails, install web shells, and gain persistent access to Exchange servers. The vulnerabilities were chained: CVE-2021-26855 (SSRF) provided initial access, and CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 enabled code execution and file write. After Microsoft published patches, exploitation accelerated as other groups reverse-engineered the fixes to develop their own exploits — a pattern known as patch-gap exploitation.
Volt Typhoon — Edge Device Pre-Positioning
CISA and Microsoft documented Volt Typhoon systematically targeting edge devices from Fortinet, Ivanti, NETGEAR, Citrix, and Cisco to gain initial access to U.S. critical infrastructure networks. The group specifically targeted devices that do not support EDR agents and have limited logging, making detection significantly harder. After exploitation, Volt Typhoon operated exclusively through valid credentials and built-in system tools (T1078 + living off the land), leaving minimal forensic evidence on the compromised edge devices themselves.
Rockwell Logix CVE-2021-22681 — Unpatchable ICS Flaw
A CVSS 9.8 authentication bypass vulnerability in Rockwell Automation's Logix programmable logic controllers has no available patch and was confirmed by CISA as actively exploited in March 2026. The vulnerability allows an unauthenticated attacker to bypass the controller's access controls — a fundamental design flaw rather than a simple software bug. Because PLCs control physical industrial processes, the exploitation of this vulnerability carries consequences beyond data compromise, potentially affecting manufacturing operations and physical safety systems.
Related: Full analysis of CVE-2021-22681 and the remediation challenges
Detection Strategies
Detecting T1190 exploitation requires monitoring both the exploitation attempt itself and the post-exploitation activity that follows a successful breach. Because many exploited systems (firewalls, VPNs, appliances) have limited native logging, detection often depends on network-level monitoring and correlation with downstream events.
Web Application and Network Monitoring
| Data Source | What to Monitor |
|---|---|
WAF Logs |
SQL injection patterns, path traversal attempts, deserialization payloads, unusual HTTP methods (PUT, DELETE) against unexpected endpoints |
Web Server Logs |
Requests to known vulnerability paths (e.g., /ecp/ for Exchange, /remote/ for FortiGate), unusual response sizes, 500-series errors followed by successful requests |
IDS/IPS |
Signature matches for known CVE exploits, unusual outbound connections from DMZ systems, reverse shell traffic patterns |
Network Flow |
New outbound connections from edge devices to external IPs, unusual traffic volume from DMZ systems to internal networks |
DNS Logs |
DNS queries from edge devices to previously unseen domains — web shells and reverse shells often resolve C2 domains on first execution |
File Integrity |
New or modified files in web-accessible directories (aspx, jsp, php files appearing in Exchange, IIS, or Apache document roots) |
Detection Queries
# Detect web shell indicators — new files in web-accessible directories
# Monitor IIS/Exchange web roots for unexpected file creation
index=wineventlog sourcetype="XmlWinEventLog:Sysmon" EventCode=11
| where match(TargetFilename, "(?i)(\\\\inetpub\\\\|\\\\wwwroot\\\\|\\\\OWA\\\\|\\\\aspnet_client\\\\)")
| where match(TargetFilename, "(?i)\\.(aspx|ashx|asmx|jsp|php|cfm)$")
| stats count by TargetFilename, Image, Computer
| sort -count
# Detect exploitation of management interfaces
# Unusual source IPs accessing administrative ports on edge devices
index=firewall OR index=vpn
| where dest_port IN (443, 8443, 10443, 4443, 4993, 8080)
| stats dc(src_ip) as unique_sources, count by dest_ip, dest_port
| where unique_sources > 20 OR count > 1000
| sort -unique_sources
# Detect post-exploitation lateral movement from DMZ systems
# Edge devices establishing new internal connections is anomalous
index=network sourcetype="firewall"
| where src_zone="dmz" AND dest_zone="internal"
| where NOT match(dest_port, "^(53|80|443|389|636)$")
| stats count, dc(dest_ip) as targets by src_ip, dest_port
| where targets > 3
| sort -targets
Edge devices that are exploited often have their logs tampered with or deleted as part of the intrusion (T1070). Forward all edge device logs to a centralized SIEM in real time. If logs only exist on the device itself, a successful attacker can erase all evidence of the compromise.
Known Threat Actors
T1190 is extensively used by both nation-state groups seeking persistent access to strategic networks and ransomware operators looking for rapid initial entry. The following groups are documented by MITRE and commercial threat intelligence as primary users:
- Volt Typhoon (China) — Systematic exploitation of edge devices (Fortinet, Ivanti, Citrix, NETGEAR) for pre-positioning in U.S. critical infrastructure
- HAFNIUM (China) — Mass exploitation of Microsoft Exchange zero-days (ProxyLogon) affecting tens of thousands of organizations
- Silk Typhoon (China) — Supply chain attacks targeting IT management software and cloud service providers
- APT40 (China) — Exploitation of public-facing applications in telecommunications and government targets across Asia-Pacific
- APT41 (China) — Combined espionage and financially motivated exploitation of web applications and enterprise software
- Sandworm / Cadet Blizzard (Russia) — Exploitation of public-facing systems in destructive attacks against Ukrainian infrastructure
- Fox Kitten (Iran) — Exploitation of VPN and remote access vulnerabilities (Fortinet, Pulse Secure, Citrix) for espionage and ransomware operations
- INC Ransom — Exploitation of internet-facing applications for initial access in ransomware campaigns
- Scattered Spider — Exploitation of public-facing authentication systems in combination with social engineering
Defensive Recommendations
- Maintain a real-time external attack surface inventory: Know every internet-facing system, service, and open port in your environment. Use external attack surface management (EASM) tools to continuously discover and monitor exposed assets, including shadow IT and forgotten test environments. You cannot patch what you do not know exists.
- Prioritize patching of edge devices and internet-facing systems: VPNs, firewalls, email servers, and web applications should be patched within hours of critical vulnerability disclosures, not days or weeks. Monitor CISA's Known Exploited Vulnerabilities (KEV) catalog for mandated remediation timelines.
- Restrict management interface access: Administrative interfaces for firewalls, VPNs, and network appliances should never be accessible from the public internet. Use out-of-band management networks, IP allowlists, or jump hosts. The FortiGate mass exploitation campaign succeeded because management ports were exposed to the internet.
- Deploy a Web Application Firewall (WAF): A WAF provides a defensive layer for web applications that cannot be patched immediately. Configure it to block known exploit patterns (SQL injection, XSS, SSRF, deserialization) and to alert on anomalous request patterns.
- Implement network segmentation: Internet-facing systems should be isolated in a DMZ with strict firewall rules controlling traffic to internal networks. A compromised web server should not have direct access to Active Directory, databases, or file shares.
- Forward all edge device logs to a centralized SIEM: Edge devices have limited local storage and logging capabilities. Real-time log forwarding ensures that exploitation evidence is preserved even if the attacker tampers with local logs. Syslog, SNMP traps, and vendor-specific APIs all provide log forwarding mechanisms.
- Conduct regular vulnerability scanning and penetration testing: Automated scanning identifies known CVEs, while penetration testing uncovers logic flaws, misconfigurations, and chained vulnerability paths that scanners miss. Test internet-facing systems at least quarterly and after significant infrastructure changes.
- Monitor CISA KEV and vendor security advisories: When a vulnerability in your edge infrastructure appears on the CISA KEV catalog or receives active exploitation reports, treat it as an incident — not just a patching task. Assume exploitation may have already occurred and hunt for indicators of compromise before patching.
MITRE ATT&CK Mapping
| Field | Value |
|---|---|
| Technique ID | T1190 |
| Technique Name | Exploit Public-Facing Application |
| Tactic | Initial Access |
| Platforms | Windows, Linux, macOS, Network Devices, Containers, IaaS, ESXi |
| Sub-Techniques | None (parent technique) |
| Data Sources | Application Log (Web, IDS/IPS, Firewall), Network Traffic (Content, Flow), File (Creation) |
| Mitigations | Vulnerability Scanning, Application Isolation and Sandboxing, Exploit Protection, Network Segmentation, Update Software, Web Application Firewall |
| MITRE Reference | attack.mitre.org/techniques/T1190 |
Sources and References
- MITRE ATT&CK — T1190 Exploit Public-Facing Application: attack.mitre.org
- Verizon — 2025 Data Breach Investigations Report: verizon.com
- CISA — Known Exploited Vulnerabilities Catalog: cisa.gov
- CISA — Volt Typhoon Advisory: cisa.gov
- Microsoft — HAFNIUM Targeting Exchange Servers (2021): microsoft.com