First published: Tue Jan 14 2025(Updated: )
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module or via crafted CSF proxy requests. Please note that reports show this is being exploited in the wild.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS and FortiProxy SSL-VPN | ||
Fortinet FortiProxy | >=7.0.0<7.0.20 | |
Fortinet FortiProxy | >=7.2.0<7.2.13 | |
Fortinet FortiOS IPS Engine | >=7.0.0<7.0.17 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.16 | |
Fortinet FortiProxy | >=7.2.0<=7.2.12 | |
Fortinet FortiProxy | >=7.0.0<=7.0.19 |
Please upgrade to FortiOS version 7.0.17 or above Please upgrade to FortiProxy version 7.2.13 or above Please upgrade to FortiProxy version 7.0.20 or above
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-55591 is considered critical due to its potential to allow remote attackers to gain super-admin privileges.
To fix CVE-2024-55591, update FortiOS to version 7.0.17 or higher, or FortiProxy to version 7.0.20 or higher.
CVE-2024-55591 affects FortiOS versions from 7.0.0 to 7.0.16.
CVE-2024-55591 impacts FortiProxy versions from 7.2.0 to 7.2.12 and from 7.0.0 to 7.0.19.
Yes, CVE-2024-55591 is reported to be actively exploited against vulnerable systems.