CVE-2024-55591

Published Jan 14, 2025

Last updated 5 months ago

Exploit knownCVSS critical 9.8
Fortinet
FortiOS
FortiProxy

Overview

AI description

Automated description summarized from trusted sources.

CVE-2024-55591 is an authentication bypass vulnerability affecting Fortinet's FortiOS and FortiProxy products. A remote, unauthenticated attacker can exploit this flaw by sending specially crafted requests to the Node.js websocket module. Successful exploitation grants the attacker super-admin privileges on the targeted device. The vulnerability affects FortiOS versions 7.0.0 through 7.0.16, FortiProxy versions 7.0.0 through 7.0.19, and FortiProxy versions 7.2.0 through 7.2.12. Fortinet confirmed active exploitation of this vulnerability as early as November 2024, with reports of attackers creating new user accounts, modifying firewall settings, and establishing SSL VPN tunnels for internal network access. This vulnerability has been assigned a CVSSv3 score of 9.6, indicating its critical nature.

Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
Source
psirt@fortinet.com
NVD status
Analyzed

Insights

Analysis from the Intruder Security Team
Published Jan 14, 2025 Updated Jan 29, 2025

This vulnerability affects the terminal console functionality within the Fortigate admin panel. It exploits a weakness in the WebSockets implementation and allows an unauthenticated attacker to create administrative accounts on the Fortinet device. watchTowr have released a technical post breaking the vulnerability down.

ArcticWolf have observed a handful of exploitations of this vulnerability in early December, where an unauthenticated threat actor has created administrative accounts and changed device configurations. They have listed a number of IoC's which can help with identifying any malicious activity on devices. Fortinet have also released similar IoC's for this vulnerability.

Fortinet have released patching information and their own IoC's here.

Intruder Premium customers will be checked for this weakness today (Jan 16th) and notified if they are vulnerable.

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability
Exploit added on
Jan 14, 2025
Exploit action due
Jan 21, 2025
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

psirt@fortinet.com
CWE-288
nvd@nist.gov
NVD-CWE-Other

Social media

Hype score
Not currently trending
  1. 🚨CVE-2024-55591: Fortinet FortiOS Authentication Bypass ZoomEye Link: https://t.co/KHvDBL8feJ ZoomEye Dork: app="Fortinet Firewall" Results: 5,320,990 Advisory: https://t.co/fA1d9WepGp PoC: https://t.co/iy5hvuPVCt CVSS: 9.8 https://t.co/eDKORfPNRK

    @TheMsterDoctor1

    17 Jun 2025

    1163 Impressions

    3 Retweets

    10 Likes

    11 Bookmarks

    0 Replies

    0 Quotes

  2. 🚨CVE-2024-55591: Fortinet FortiOS Authentication Bypass ZoomEye Link: https://t.co/dCnJAPVshB ZoomEye Dork: app="Fortinet Firewall" Results: 5,320,990 Advisory: https://t.co/9ljTwds7VA PoC: https://t.co/pC94Vb0ljR CVSS: 9.8 https://t.co/3W8N7H4UZI

    @DarkWebInformer

    17 Jun 2025

    24441 Impressions

    80 Retweets

    308 Likes

    172 Bookmarks

    2 Replies

    1 Quote

  3. SuperBlack exploits CVE-2024-55591 and CVE-2025-24472 in Fortinet systems. AI ShieldNet uses behavioral AI to detect and stop zero-day attacks like this. Website: https://t.co/eeFYunNtwv #Cybersecurity #AIShieldNet #prosfinity https://t.co/Du0dl8F8rR

    @prosfinity

    10 Jun 2025

    61 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Fortinet vulnerabilities exploited by Qilin ransomware The Qilin ransomware group (aka Phantom Mantis) is exploiting Fortinet vulnerabilities, including CVE-2024-21762 and CVE-2024-55591, to gain remote code execution and access internal networks. Active since 2022, Qilin uses h

    @dCypherIO

    9 Jun 2025

    55 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Fortinetの脆弱性(CVE-2024-21762,CVE-2024-55591)を悪用したサイバー攻撃が拡大中 https://t.co/RHJEikMHX9

    @AileenWoodstock

    8 Jun 2025

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. Fortinetの脆弱性(CVE-2024-21762,CVE-2024-55591)を悪用したサイバー攻撃が拡大中 #セキュリティ対策Lab #セキュリティ #Security https://t.co/GgalfSU2bM

    @securityLab_jp

    8 Jun 2025

    46 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  7. フォーティネットの重大(Critical)な脆弱性をQilinランサムウェア集団が悪用している。PRODAFT社報告。中程度の信頼度で、CVE-2024-21762やCVE-2024-55591等を悪用。 https://t.co/XScMoF8cu2

    @__kokumoto

    7 Jun 2025

    1938 Impressions

    2 Retweets

    22 Likes

    9 Bookmarks

    0 Replies

    1 Quote

  8. 🚨مجموعة الفدية Qilin تقوم حاليًا باستغلالٍ نشط لثغرات أمنية حرجة في أنظمة Fortigate (مثل CVE-2024-21762 و CVE-2024-55591)، في هجماتٍ مؤتمتة بالكامل، باستثناء اختيار الضحايا

    @abdul__alamri

    6 Jun 2025

    594 Impressions

    0 Retweets

    2 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  9. 🚨 Threat actors are actively exploiting Fortigate vulnerabilities (CVE-2024-21762, CVE-2024-55591, and others) to deploy Qilin ransomware. The attack is fully automated, with only victim selection done manually. Details in our flash alert on CATALYST: https://t.co/BDjEX2KqqO

    @PRODAFT

    6 Jun 2025

    5542 Impressions

    16 Retweets

    33 Likes

    18 Bookmarks

    0 Replies

    0 Quotes

  10. 🚨 Fortinet zero-day (CVE-2024-55591) is under attack! Replace vulnerable firewalls with WEBOUNCER by https://t.co/YvUrFmPcXS for cutting-edge network security. 🔐 Upgrade now: https://t.co/YzmadoBshH #Cybersecurity #FortinetAlternative https://t.co/gqTFygakmX

    @BrainLabVisions

    23 May 2025

    40 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. (🧵Thread) 🚨 Spike in Fortinet CVE-2024-55591 Vulnerability Rapidly Increased in the past Week The CrowdSec Network has detected a wave of exploitation attempts targeting CVE-2024-55591, a Fortinet vulnerability that affects FortiWAN versions before 5.3.2. First seen on Apr

    @Crowd_Security

    19 May 2025

    321 Impressions

    1 Retweet

    4 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. 注意喚起: Fortinet製FortiOSおよびFortiProxyにおける認証回避の脆弱性(CVE-2024-55591)に関する注意喚起 (更新) https://t.co/RjF8IkgZ6M

    @AileenWoodstock

    15 May 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. 統合版 JPCERT/CC | 注意喚起: Fortinet製FortiOSおよびFortiProxyにおける認証回避の脆弱性(CVE-2024-55591)に関する注意喚起 (更新) https://t.co/XhpyuYiDAz #itsec_jp

    @itsec_jp

    15 May 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. FotiOS、super-admin権限を奪取される脆弱性(CVE-2024-55591)を狙う攻撃は日本でも発生。 へーしゃは1月に対応済みです。 https://t.co/el9P6yEFNe

    @MrGensui56

    12 May 2025

    172 Impressions

    1 Retweet

    4 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  15. 更新:Fortinet 製 FortiOS の脆弱性対策について(CVE-2024-55591) [https://t.co/l2C5bfTI5Z]

    @securenews_web

    12 May 2025

    491 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. 更新:Fortinet 製 FortiOS の脆弱性対策について(CVE-2024-55591) https://t.co/bGSAFUoQ2w

    @ICATalerts

    12 May 2025

    3091 Impressions

    2 Retweets

    3 Likes

    2 Bookmarks

    0 Replies

    2 Quotes

  17. Fortinet製FortiOSおよびFortiProxyにおける認証回避の脆弱性(CVE-2024-55591)に関する注意喚起 #JPCERTCC (May 9) https://t.co/Ste0O8fwQk

    @foxbook

    11 May 2025

    774 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. Fortinet製FortiOSおよびFortiProxyにおける認証回避の脆弱性(CVE-2024-55591)に関する注意喚起 2025年5月9日更新 https://t.co/oqVBr5IhDq

    @piyokango

    9 May 2025

    4449 Impressions

    2 Retweets

    8 Likes

    5 Bookmarks

    0 Replies

    0 Quotes

  19. Fortinetの脆弱性(CVE-2024-55591,CVE-2025-24472)を狙うサイバー攻撃が国内でも発生-JPCERTが警告 #セキュリティ対策Lab #セキュリティ #Security https://t.co/K2LlhH44nA

    @securityLab_jp

    9 May 2025

    68 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  20. 🚨Fortinet製FortiOSおよびFortiProxyにおける認証回避の脆弱性(CVE-2024-55591)に関する注意喚起 🗓️2025-05-09 https://t.co/Qfkj2ZmnOC @jpcert

    @m_nakamura_jp

    9 May 2025

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Fortinet製FortiOSおよびFortiProxyにおける認証回避の脆弱性(CVE-2024-55591)に関する注意喚起 https://t.co/QravAHIj7o @jpcert

    @hashiken_com

    9 May 2025

    53 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  22. 【更新】Fortinet製FortiOSおよびFortiProxyにおける認証回避の脆弱性(CVE-2024-55591)に関する注意喚起を更新。2025年3月以降に国内で発生したインシデントにおいて、本脆弱性が悪用された事例があることを確認し

    @jpcert

    9 May 2025

    4578 Impressions

    12 Retweets

    23 Likes

    6 Bookmarks

    0 Replies

    0 Quotes

  23. 注意喚起: Fortinet製FortiOSおよびFortiProxyにおける認証回避の脆弱性(CVE-2024-55591)に関する注意喚起 (更新) https://t.co/t3WywYY9x1

    @AileenWoodstock

    9 May 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. 統合版 JPCERT/CC | 注意喚起: Fortinet製FortiOSおよびFortiProxyにおける認証回避の脆弱性(CVE-2024-55591)に関する注意喚起 (更新) https://t.co/BKWOqtbKYx #itsec_jp

    @itsec_jp

    9 May 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    22 Apr 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  26. 🚨 New research alert! 🇯🇵 A KeyPlug-linked server briefly exposed Fortinet exploits, a custom webshell, and recon scripts aimed at a major Japanese company. https://t.co/30805UtWdC The Fortinet tooling aligns with CVE-2024-55591, and the recon activity points to interest in

    @Huntio

    17 Apr 2025

    1431 Impressions

    10 Retweets

    25 Likes

    9 Bookmarks

    0 Replies

    0 Quotes

  27. 🚨 CVE-2024-55591 - critical 🚨 Fortinet Authentication Bypass > Fortinet FortiOS is vulnerable to an information disclosure via service-worker.js tha... 👾 https://t.co/1LyudOh9mW @pdnuclei #NucleiTemplates #cve

    @pdnuclei_bot

    8 Apr 2025

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. Sorry, I was so absorbed with fresh RansomHub IR this evening that I completely forgot about the KQL query of the day ... It'll be back tomorrow! PS: Have you patched for CVE-2024-55591 yet? Don't expose your Admin interface on the Internet too. I'm happy you do, but you won't

    @SecurityAura

    28 Mar 2025

    672 Impressions

    1 Retweet

    9 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  29. Get FortiRekt, I Am The Super_Admin Now - Fortinet FortiOS Authentication Bypass CVE-2024-55591 https://t.co/YpA4sWbGgD

    @pentest_swissky

    26 Mar 2025

    1691 Impressions

    8 Retweets

    20 Likes

    8 Bookmarks

    0 Replies

    0 Quotes

  30. Honestly, if you didn't patch your FortiGate (FortiOS) for CVE-2024-55591, you'll get a visit from RansomHub. It's just a matter of time, it may have already happened. Make sure to review ALL the accounts on your FortiGates and admin actions even if it's patched, just sayin'.

    @SecurityAura

    25 Mar 2025

    5319 Impressions

    15 Retweets

    63 Likes

    21 Bookmarks

    2 Replies

    1 Quote

  31. 🚨 Fortinet has patched critical vulnerabilities (NCSC-2025-0082) in FortiOS, FortiProxy, FortiPAM, FortiSRA, and FortiWeb. Exploited in ransomware attacks, this flaw allows unauthorized code execution. Patch now! #CVE-2024-55591 #CVE-2025-24472 https://t.co/tPrTnAvPap

    @RedTeamNewsBlog

    24 Mar 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. به تازگی باج افزاری به نام Mora_001 منتشر شده است که از ۲ آسیب پذیدی مربوط به Fortinet با کدهای شناسایی CVE-2024-55591 و CVE-2024-55591 برای گرفتن دسترسی اولیه و سپس رمز نگاری فایل ها استفاده می کند. https://t.co/Poz3aKY03t https://t.co/81F1TvyNgl

    @AmirHossein_sec

    22 Mar 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild https://t.co/JKP7iKm1cw https://t.co/wLVCa5eRyG

    @dansantanna

    22 Mar 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. FortiOS, FotiProxyの脆弱性の悪用が確認されているとのこと。 CVE-2025-24472 CVE-2024-55591 Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns - Infosecurity Magazine https://t.co/w3vcJozVFT

    @ntsuji

    21 Mar 2025

    6448 Impressions

    30 Retweets

    69 Likes

    18 Bookmarks

    2 Replies

    1 Quote

  35. Ransomware Alert! Fortinet Under Siege: New ransomware gang SuperBlack exploits CVE-2024-55591 & CVE-2025-24472! CVE-2024-55591 – An Authentication bypass vulnerability affecting Fortinet's FortiOS and FortiProxy products. This flaw allows remote attackers to gain super-adm

    @Loginsoft_Inc

    19 Mar 2025

    79 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  36. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    17 Mar 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  37. 🚨 Hackers linked to LockBit are exploiting Fortinet firewall vulnerabilities (CVE-2024-55591 & CVE-2025-24472) to deploy the SuperBlack ransomware. 🔹 Data is exfiltrated before encryption 🔹 Strong ties to LockBit 3.0 ransomware 🔹 Unpatched orgs remain at risk 📌 Patch NOW

    @the_aryanmittal

    17 Mar 2025

    52 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. New ransomware group Mora_001 is exploiting Fortinet vulnerabilities (CVE-2024-55591, CVE-2025-24472), linked to LockBit. Affected devices may face threats if not patched. 🚨 #Fortinet #Ransomware #USA link: https://t.co/ddxsXkSqYa https://t.co/Sbhk3dsM1c

    @TweetThreatNews

    17 Mar 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  39. به تازگی باج افزاری به نام Mora_001 منتشر شده است که از ۲ آسیب پذیدی مربوط به Fortinet با کدهای شناسایی CVE-2024-55591 و CVE-2024-55591 برای گرفتن دسترسی اولیه و سپس رمز نگاری فایل ها استفاده می کند.

    @cybernetic_cy

    17 Mar 2025

    93 Impressions

    2 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    17 Mar 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  41. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    17 Mar 2025

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  42. SuperBlack ransomware exploits Fortinet auth bypass flaws. The two vulnerabilities, both authentication bypasses, are CVE-2024-55591 and CVE-2025-24472, which Fortinet disclosed in January and February. https://t.co/D4e54UyCDn https://t.co/xjXCWZmSBr

    @riskigy

    16 Mar 2025

    74 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. Cyber Alert : "SuperBlack ransomware is crashing the party, sneaking through Fortinet firewall holes (CVE-2024-55591, CVE-2025-24472)! A sneaky Russian hacker’s behind it, turning cyber chaos up to 11. Patch those systems fast—don’t let this villain steal the show!" #cybercrime

    @MohamedMar66543

    16 Mar 2025

    71 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    16 Mar 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  45. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    15 Mar 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  46. FortiOS和FortiProxy身份认证绕过漏洞 (CVE-2024-55591) 在野利用通告 未经身份验证的远程攻击者可以通过向 Node.js websocket 模块发送特制请求,成功利用此漏洞可使攻击者获得超级管理员权限。 https://t.co/SisgHzHDjk

    @chenze654321

    15 Mar 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. Threat Alert: Recent Fortinet Vulnerabilities Exploited in 'SuperBlack' Ransomware Attacks CVE-2024-55591 CVE-2025-24472 CVE-2025-2447 Severity: 🔴 High Maturity: 💥 Mainstream Learn more: https://t.co/sg0tFeoYVO #CyberSecurity #ThreatIntel #InfoSec

    @fletch_ai

    15 Mar 2025

    85 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  48. ⚠️ Vulnerability Alert: Authentication Bypass Vulnerabilities in Fortinet Firewalls 📅 Timeline: Disclosure: 2024-01-14, Patch: 2025-01-21 📌 Attribution: 🆔cveId: CVE-2024-55591, CVE-2025-24472 📊baseScore: 📏cvssMetrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H… https:

    @syedaquib77

    15 Mar 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. CVE-2024-55591 & CVE-2025-24472: Fortinet’s Double Vulnerability Nightmare https://t.co/vI63gkrOHW

    @Dinosn

    15 Mar 2025

    5915 Impressions

    39 Retweets

    104 Likes

    34 Bookmarks

    0 Replies

    1 Quote

  50. CVE-2024-55591 & CVE-2025-24472: Fortinet's Double Vulnerability Nightmare Forescout researchers have identified a new ransomware group, dubbed Mora_001, exploiting two critical vulnerabilities in Fortinet products to gain unauthorized access to firewalls https://t.co/wwPp7i

    @the_yellow_fall

    15 Mar 2025

    924 Impressions

    4 Retweets

    14 Likes

    6 Bookmarks

    0 Replies

    1 Quote

Configurations

References

Sources include official advisories and independent security research.