CVE-2024-55591

Published Jan 14, 2025

Last updated 2 months ago

Exploit knownCVSS critical 9.8
Fortinet
FortiOS
FortiProxy

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2024-55591 is an authentication bypass vulnerability affecting Fortinet's FortiOS and FortiProxy products. A remote, unauthenticated attacker can exploit this flaw by sending specially crafted requests to the Node.js websocket module. Successful exploitation grants the attacker super-admin privileges on the targeted device. The vulnerability affects FortiOS versions 7.0.0 through 7.0.16, FortiProxy versions 7.0.0 through 7.0.19, and FortiProxy versions 7.2.0 through 7.2.12. Fortinet confirmed active exploitation of this vulnerability as early as November 2024, with reports of attackers creating new user accounts, modifying firewall settings, and establishing SSL VPN tunnels for internal network access. This vulnerability has been assigned a CVSSv3 score of 9.6, indicating its critical nature.

Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
Source
psirt@fortinet.com
NVD status
Analyzed

Insights

Analysis from the Intruder Security Team
Published Jan 14, 2025 Updated Jan 29, 2025

This vulnerability affects the terminal console functionality within the Fortigate admin panel. It exploits a weakness in the WebSockets implementation and allows an unauthenticated attacker to create administrative accounts on the Fortinet device. watchTowr have released a technical post breaking the vulnerability down.

ArcticWolf have observed a handful of exploitations of this vulnerability in early December, where an unauthenticated threat actor has created administrative accounts and changed device configurations. They have listed a number of IoC's which can help with identifying any malicious activity on devices. Fortinet have also released similar IoC's for this vulnerability.

Fortinet have released patching information and their own IoC's here.

Intruder Premium customers will be checked for this weakness today (Jan 16th) and notified if they are vulnerable.

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability
Exploit added on
Jan 14, 2025
Exploit action due
Jan 21, 2025
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

psirt@fortinet.com
CWE-288
nvd@nist.gov
NVD-CWE-Other

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

1

  1. 🚨 Fortinet has patched critical vulnerabilities (NCSC-2025-0082) in FortiOS, FortiProxy, FortiPAM, FortiSRA, and FortiWeb. Exploited in ransomware attacks, this flaw allows unauthorized code execution. Patch now! #CVE-2024-55591 #CVE-2025-24472 https://t.co/tPrTnAvPap

    @RedTeamNewsBlog

    24 Mar 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. به تازگی باج افزاری به نام Mora_001 منتشر شده است که از ۲ آسیب پذیدی مربوط به Fortinet با کدهای شناسایی CVE-2024-55591 و CVE-2024-55591 برای گرفتن دسترسی اولیه و سپس رمز نگاری فایل ها استفاده می کند. https://t.co/Poz3aKY03t https://t.co/81F1TvyNgl

    @AmirHossein_sec

    22 Mar 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild https://t.co/JKP7iKm1cw https://t.co/wLVCa5eRyG

    @dansantanna

    22 Mar 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. FortiOS, FotiProxyの脆弱性の悪用が確認されているとのこと。 CVE-2025-24472 CVE-2024-55591 Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns - Infosecurity Magazine https://t.co/w3vcJozVFT

    @ntsuji

    21 Mar 2025

    6448 Impressions

    30 Retweets

    69 Likes

    18 Bookmarks

    2 Replies

    1 Quote

  5. Ransomware Alert! Fortinet Under Siege: New ransomware gang SuperBlack exploits CVE-2024-55591 & CVE-2025-24472! CVE-2024-55591 – An Authentication bypass vulnerability affecting Fortinet's FortiOS and FortiProxy products. This flaw allows remote attackers to gain super-adm

    @Loginsoft_Inc

    19 Mar 2025

    79 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  6. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    17 Mar 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  7. 🚨 Hackers linked to LockBit are exploiting Fortinet firewall vulnerabilities (CVE-2024-55591 & CVE-2025-24472) to deploy the SuperBlack ransomware. 🔹 Data is exfiltrated before encryption 🔹 Strong ties to LockBit 3.0 ransomware 🔹 Unpatched orgs remain at risk 📌 Patch NOW

    @the_aryanmittal

    17 Mar 2025

    52 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. New ransomware group Mora_001 is exploiting Fortinet vulnerabilities (CVE-2024-55591, CVE-2025-24472), linked to LockBit. Affected devices may face threats if not patched. 🚨 #Fortinet #Ransomware #USA link: https://t.co/ddxsXkSqYa https://t.co/Sbhk3dsM1c

    @TweetThreatNews

    17 Mar 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. به تازگی باج افزاری به نام Mora_001 منتشر شده است که از ۲ آسیب پذیدی مربوط به Fortinet با کدهای شناسایی CVE-2024-55591 و CVE-2024-55591 برای گرفتن دسترسی اولیه و سپس رمز نگاری فایل ها استفاده می کند.

    @cybernetic_cy

    17 Mar 2025

    93 Impressions

    2 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    17 Mar 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  11. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    17 Mar 2025

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. SuperBlack ransomware exploits Fortinet auth bypass flaws. The two vulnerabilities, both authentication bypasses, are CVE-2024-55591 and CVE-2025-24472, which Fortinet disclosed in January and February. https://t.co/D4e54UyCDn https://t.co/xjXCWZmSBr

    @riskigy

    16 Mar 2025

    74 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. Cyber Alert : "SuperBlack ransomware is crashing the party, sneaking through Fortinet firewall holes (CVE-2024-55591, CVE-2025-24472)! A sneaky Russian hacker’s behind it, turning cyber chaos up to 11. Patch those systems fast—don’t let this villain steal the show!" #cybercrime

    @MohamedMar66543

    16 Mar 2025

    71 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    16 Mar 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  15. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    15 Mar 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  16. FortiOS和FortiProxy身份认证绕过漏洞 (CVE-2024-55591) 在野利用通告 未经身份验证的远程攻击者可以通过向 Node.js websocket 模块发送特制请求,成功利用此漏洞可使攻击者获得超级管理员权限。 https://t.co/SisgHzHDjk

    @chenze654321

    15 Mar 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. Threat Alert: Recent Fortinet Vulnerabilities Exploited in 'SuperBlack' Ransomware Attacks CVE-2024-55591 CVE-2025-24472 CVE-2025-2447 Severity: 🔴 High Maturity: 💥 Mainstream Learn more: https://t.co/sg0tFeoYVO #CyberSecurity #ThreatIntel #InfoSec

    @fletch_ai

    15 Mar 2025

    85 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  18. ⚠️ Vulnerability Alert: Authentication Bypass Vulnerabilities in Fortinet Firewalls 📅 Timeline: Disclosure: 2024-01-14, Patch: 2025-01-21 📌 Attribution: 🆔cveId: CVE-2024-55591, CVE-2025-24472 📊baseScore: 📏cvssMetrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H… https:

    @syedaquib77

    15 Mar 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. CVE-2024-55591 & CVE-2025-24472: Fortinet’s Double Vulnerability Nightmare https://t.co/vI63gkrOHW

    @Dinosn

    15 Mar 2025

    5915 Impressions

    39 Retweets

    104 Likes

    34 Bookmarks

    0 Replies

    1 Quote

  20. CVE-2024-55591 & CVE-2025-24472: Fortinet's Double Vulnerability Nightmare Forescout researchers have identified a new ransomware group, dubbed Mora_001, exploiting two critical vulnerabilities in Fortinet products to gain unauthorized access to firewalls https://t.co/wwPp7i

    @the_yellow_fall

    15 Mar 2025

    924 Impressions

    4 Retweets

    14 Likes

    6 Bookmarks

    0 Replies

    1 Quote

  21. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    15 Mar 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  22. SuperBlack Ransomware Targets Fortinet Flaws Hackers exploit Fortinet CVE-2024-55591 & CVE-2025-24472 to gain super_admin access, steal data & deploy SuperBlack ransomware 🛑 Linked to LockBit, it erases forensic traces with WipeBlack! Patch now!⚠️ https://t.co/q8dvOPU

    @dCypherIO

    14 Mar 2025

    21 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  23. 🚨 SuperBlack ransomware is exploiting Fortinet vulnerabilities! 📌 CVE-2024-55591 & CVE-2025-24472 used for initial access 📌 Double extortion + custom wiper WipeBlack 📌 Uses LockBit’s leaked builder Patch your systems! Breaking news from the world &… https://t.co/ZF7G3

    @godeepweb

    14 Mar 2025

    37 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  24. Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks The newly discovered SuperBlack ransomware has been exploiting two vulnerabilities CVE-2024-55591 and CVE-2025-24472 in Fortinet firewalls. https://t.co/1TlLQtZmcC https://t.co/Pf5olgk4t6

    @persistsec

    14 Mar 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. According to Forescout, SuperBlack ransomware is exploiting CVE-2024-55591 and CVE-2025-24472, which target FortiGate 7.0.X management interfaces patched in Jan 2025. My latest investigation found over 30K vulnerable servers worldwide (Mgmt interface exposed, no patch applied). h

    @nekono_naha

    14 Mar 2025

    1333 Impressions

    4 Retweets

    9 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  26. 2025年1月に修正されたFortiGate7.0.X系の管理画面を対象としたCVE-2024-55591、CVE-2025-24472を悪用したSuperBlackランサム攻撃をForescout社が報告。調査した所、本日時点でもグローバルで23K台、国内1K台超の脆弱サーバを発見。なお、管理画面閉鎖、パッチ適用済み機器でも以下のような極めて面倒… https://t.co/FYC5CH9Lqq https://t.co/kpJ4Cr5M7f

    @nekono_naha

    14 Mar 2025

    3008 Impressions

    8 Retweets

    39 Likes

    18 Bookmarks

    0 Replies

    1 Quote

  27. A ransomware group, Mora_001, exploits Fortinet vulnerabilities CVE-2024-55591 and CVE-2025-24472 to deploy SuperBlack ransomware, with the latter confirmed exploited in attacks since February 2025, despite prior reassurances from Fortinet. #Security https://t.co/ARD6Z4X3bb

    @Strivehawk

    13 Mar 2025

    65 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  28. Acompanhe o site da NetSensor. No último dia 14 de Janeiro de 2025 tanto a Fortinet quanto Agência de Segurança Cibernética dos EUA (CISA) emitiram um alerta urgente sobre a vulnerabilidade CVE-2024-55591 https://t.co/Ofg8by2I8B https://t.co/omg1YW4AMk

    @LinuxHelp2052

    11 Mar 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. #threatreport #LowCompleteness Flash Notice: CVE-2025-24472 Actively Exploited - Patch and Manage | 03-03-2025 Source: https://t.co/PsbNnmQd6Y Key details below ↓ 🎯Victims: Fortinet 🔓CVEs: CVE-2024-55591 \[[Vulners](https://t.co/cNWxPVNtLL)] - CVSS V3.1: *9.8*, -… https:/

    @rst_cloud

    3 Mar 2025

    52 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. Штурмуем крепость. Обходим аутентификацию в FortiOS и FortiProxy В этой статье я расскажу, как искал недавно раскрытую компанией Fortinet уязвимость CVE-2024-55591 в продуктах FortiOS и FortiProxy. https://t.co/UUim3Bt6lY

    @XakepRU

    18 Feb 2025

    411 Impressions

    0 Retweets

    2 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  31. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    17 Feb 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  32. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    16 Feb 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  33. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    15 Feb 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  34. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    14 Feb 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  35. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    13 Feb 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  36. Fortinet has disclosed CVE-2025-24472, a vulnerability fixed in January, not a zero-day. Only CVE-2024-55591 is actively exploited. Organizations should secure their FortiOS & FortiProxy firewalls. 🔒 #Fortinet #Vulnerability #USA link: https://t.co/oUDNrTOWvi https://t.co/G

    @TweetThreatNews

    12 Feb 2025

    15 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  37. FortiOSとFortiProxyの一部のバージョンにおいて、「認証バイパス」(CWE-288)の脆弱性CVE-2025-24472, CVE-2024-55591 攻撃者はNode.jsのWebSocketモジュールまたはCSFのプロキシリクエストを利用したリクエストを送ることで、管理者(スーパーユーザー)権限を取得します。 https://t.co/npc0IB0htf

    @t_nihonmatsu

    12 Feb 2025

    270 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  38. タイトル見てCVE-2025-24472 が また新しいFortiOSのゼロデイかと驚きましたが、先月から騒ぎになってるCVE-2024-55591と影響範囲や対策バージョンは同じですね。内部的な攻撃経路が異なるので違うCVEをアサインしたのだと思われます。先月分でパッチ済みなら対処不要です。 https://t.co/agESMYZmn2

    @nekono_naha

    12 Feb 2025

    1933 Impressions

    8 Retweets

    29 Likes

    7 Bookmarks

    0 Replies

    0 Quotes

  39. Fortinetで新たなゼロデイ脆弱性(CVE-2025-24472) 過去の既知の脆弱性(CVE-2024-55591)も悪用しインターネットに公開されたファイアウォールの管理ポータルを狙い、不正アクセスを試みる高度な手法が用いられています。 #セキュリティ対策Lab #セキュリティ https://t.co/O0SvszeLXw

    @securityLab_jp

    12 Feb 2025

    31 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  40. Critical Authentication Bypass vulnerabilities in Fortinet FortiOS & FortiProxy exploited in the wild! CVE-2025-24472, CVE-2024-55591 Attackers can gain super-admin privileges 📌 Patch immediately! #CyberSecurity #Vulmon https://t.co/xkzq4Kuidx

    @vulmoncom

    11 Feb 2025

    2997 Impressions

    6 Retweets

    6 Likes

    4 Bookmarks

    1 Reply

    3 Quotes

  41. 🚨 ALERTA CRÍTICA: 21,871 dispositivos Fortinet en México bajo ataque activo – Instituciones gubernamentales en riesgo Nuestro Centro de Monitoreo e Inteligencia de TPX Security ha detectado la explotación masiva del CVE-2024-55591, comprometiendo infraestructuras críticas en…

    @tpx_Security

    10 Feb 2025

    274 Impressions

    3 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  42. #Vulnerability #CVE202455591 Active Exploitation of CVE-2024-55591 (CVSS 9.6): FortiOS and FortiProxy Under Threat https://t.co/ciAbzYwPn0

    @Komodosec

    9 Feb 2025

    48 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    9 Feb 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  44. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    8 Feb 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  45. PoC Released for CVE-2024-55591, a vulnerability in the jsconsole functionality that could allow attackers to add a new administrative account. Nearly 45,000 hosts remain vulnerable as of January 27, 2025. Read More: https://t.co/xAE8KB0MZt #DSTC #cybersecurity https://t.co/M

    @dstcMENA

    6 Feb 2025

    60 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  46. CVE-2024-55591 - Fortinet FortiOS Authorization Bypass vulnerability https://t.co/YhzXKaG4Fq https://t.co/b0yVj3U3Q9

    @ticveintitres

    5 Feb 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    4 Feb 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  48. 🚨 Active vulnerability exploitation 🚨 #barnaul, a threat actor active on a Russian-speaking underground forum, is selling a Python exploit for #CVE-2024-55591 targeting #Fortinet FortiOS (v7.0.0–7.0.16) at a price of US$3000. The tool accepts a list of IP:port entries to… http

    @KrakenLabs_Team

    3 Feb 2025

    192 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. PoC Releases for CVE-2024-55591: Fortinet FortiOS Exploited in the Wild https://t.co/AYQrFR3YHh

    @the_yellow_fall

    3 Feb 2025

    432 Impressions

    6 Retweets

    6 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. Sonunda sistemler aktif, hazır ve nazır heldedir. CVE-2024-55591 cyber sec çalışması yapıldı. 2 laptop kurulumu, 3 ana server, 8 VM yapısı ayağa kaldırıldı :)

    @FikretAkinCom

    1 Feb 2025

    682 Impressions

    0 Retweets

    9 Likes

    1 Bookmark

    1 Reply

    0 Quotes

Configurations