First published: Tue Jan 14 2025(Updated: )
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module. Please note that reports show this is being exploited in the wild.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=7.0.0<=7.0.16 | |
Fortinet FortiProxy | >=7.2.0<=7.2.12 | |
Fortinet FortiProxy | >=7.0.0<=7.0.19 | |
Fortinet FortiProxy | >=7.0.0<7.0.20 | |
Fortinet FortiProxy | >=7.2.0<7.2.13 | |
Fortinet FortiOS | >=7.0.0<7.0.17 | |
Fortinet FortiOS and FortiProxy |
Please upgrade to FortiOS version 7.0.17 or above Please upgrade to FortiProxy version 7.2.13 or above Please upgrade to FortiProxy version 7.0.20 or above
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.