CVE-2024-55591

Published Jan 14, 2025

Last updated a month ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2024-55591 is an authentication bypass vulnerability affecting Fortinet's FortiOS and FortiProxy products. A remote, unauthenticated attacker can exploit this flaw by sending specially crafted requests to the Node.js websocket module. Successful exploitation grants the attacker super-admin privileges on the targeted device. The vulnerability affects FortiOS versions 7.0.0 through 7.0.16, FortiProxy versions 7.0.0 through 7.0.19, and FortiProxy versions 7.2.0 through 7.2.12. Fortinet confirmed active exploitation of this vulnerability as early as November 2024, with reports of attackers creating new user accounts, modifying firewall settings, and establishing SSL VPN tunnels for internal network access. This vulnerability has been assigned a CVSSv3 score of 9.6, indicating its critical nature.

Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
Source
psirt@fortinet.com
NVD status
Analyzed

Insights

Analysis from the Intruder Security Team
Published Jan 14, 2025 Updated Jan 29, 2025

This vulnerability affects the terminal console functionality within the Fortigate admin panel. It exploits a weakness in the WebSockets implementation and allows an unauthenticated attacker to create administrative accounts on the Fortinet device. watchTowr have released a technical post breaking the vulnerability down.

ArcticWolf have observed a handful of exploitations of this vulnerability in early December, where an unauthenticated threat actor has created administrative accounts and changed device configurations. They have listed a number of IoC's which can help with identifying any malicious activity on devices. Fortinet have also released similar IoC's for this vulnerability.

Fortinet have released patching information and their own IoC's here.

Intruder Premium customers will be checked for this weakness today (Jan 16th) and notified if they are vulnerable.

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability
Exploit added on
Jan 14, 2025
Exploit action due
Jan 21, 2025
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

psirt@fortinet.com
CWE-288
nvd@nist.gov
NVD-CWE-Other

Social media

Hype score
Not currently trending
  1. Штурмуем крепость. Обходим аутентификацию в FortiOS и FortiProxy В этой статье я расскажу, как искал недавно раскрытую компанией Fortinet уязвимость CVE-2024-55591 в продуктах FortiOS и FortiProxy. https://t.co/UUim3Bt6lY

    @XakepRU

    18 Feb 2025

    411 Impressions

    0 Retweets

    2 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  2. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    17 Feb 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  3. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    16 Feb 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  4. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    15 Feb 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  5. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    14 Feb 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  6. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    13 Feb 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  7. Fortinet has disclosed CVE-2025-24472, a vulnerability fixed in January, not a zero-day. Only CVE-2024-55591 is actively exploited. Organizations should secure their FortiOS & FortiProxy firewalls. 🔒 #Fortinet #Vulnerability #USA link: https://t.co/oUDNrTOWvi https://t.co/G

    @TweetThreatNews

    12 Feb 2025

    15 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  8. FortiOSとFortiProxyの一部のバージョンにおいて、「認証バイパス」(CWE-288)の脆弱性CVE-2025-24472, CVE-2024-55591 攻撃者はNode.jsのWebSocketモジュールまたはCSFのプロキシリクエストを利用したリクエストを送ることで、管理者(スーパーユーザー)権限を取得します。 https://t.co/npc0IB0htf

    @t_nihonmatsu

    12 Feb 2025

    270 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. タイトル見てCVE-2025-24472 が また新しいFortiOSのゼロデイかと驚きましたが、先月から騒ぎになってるCVE-2024-55591と影響範囲や対策バージョンは同じですね。内部的な攻撃経路が異なるので違うCVEをアサインしたのだと思われます。先月分でパッチ済みなら対処不要です。 https://t.co/agESMYZmn2

    @nekono_naha

    12 Feb 2025

    1933 Impressions

    8 Retweets

    29 Likes

    7 Bookmarks

    0 Replies

    0 Quotes

  10. Fortinetで新たなゼロデイ脆弱性(CVE-2025-24472) 過去の既知の脆弱性(CVE-2024-55591)も悪用しインターネットに公開されたファイアウォールの管理ポータルを狙い、不正アクセスを試みる高度な手法が用いられています。 #セキュリティ対策Lab #セキュリティ https://t.co/O0SvszeLXw

    @securityLab_jp

    12 Feb 2025

    31 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Critical Authentication Bypass vulnerabilities in Fortinet FortiOS & FortiProxy exploited in the wild! CVE-2025-24472, CVE-2024-55591 Attackers can gain super-admin privileges 📌 Patch immediately! #CyberSecurity #Vulmon https://t.co/xkzq4Kuidx

    @vulmoncom

    11 Feb 2025

    2997 Impressions

    6 Retweets

    6 Likes

    4 Bookmarks

    1 Reply

    3 Quotes

  12. 🚨 ALERTA CRÍTICA: 21,871 dispositivos Fortinet en México bajo ataque activo – Instituciones gubernamentales en riesgo Nuestro Centro de Monitoreo e Inteligencia de TPX Security ha detectado la explotación masiva del CVE-2024-55591, comprometiendo infraestructuras críticas en…

    @tpx_Security

    10 Feb 2025

    274 Impressions

    3 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  13. #Vulnerability #CVE202455591 Active Exploitation of CVE-2024-55591 (CVSS 9.6): FortiOS and FortiProxy Under Threat https://t.co/ciAbzYwPn0

    @Komodosec

    9 Feb 2025

    48 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    9 Feb 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  15. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    8 Feb 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  16. PoC Released for CVE-2024-55591, a vulnerability in the jsconsole functionality that could allow attackers to add a new administrative account. Nearly 45,000 hosts remain vulnerable as of January 27, 2025. Read More: https://t.co/xAE8KB0MZt #DSTC #cybersecurity https://t.co/M

    @dstcMENA

    6 Feb 2025

    60 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  17. CVE-2024-55591 - Fortinet FortiOS Authorization Bypass vulnerability https://t.co/YhzXKaG4Fq https://t.co/b0yVj3U3Q9

    @ticveintitres

    5 Feb 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. Actively exploited CVE : CVE-2024-55591

    @transilienceai

    4 Feb 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  19. 🚨 Active vulnerability exploitation 🚨 #barnaul, a threat actor active on a Russian-speaking underground forum, is selling a Python exploit for #CVE-2024-55591 targeting #Fortinet FortiOS (v7.0.0–7.0.16) at a price of US$3000. The tool accepts a list of IP:port entries to… http

    @KrakenLabs_Team

    3 Feb 2025

    192 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. PoC Releases for CVE-2024-55591: Fortinet FortiOS Exploited in the Wild https://t.co/AYQrFR3YHh

    @the_yellow_fall

    3 Feb 2025

    432 Impressions

    6 Retweets

    6 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Sonunda sistemler aktif, hazır ve nazır heldedir. CVE-2024-55591 cyber sec çalışması yapıldı. 2 laptop kurulumu, 3 ana server, 8 VM yapısı ayağa kaldırıldı :)

    @FikretAkinCom

    1 Feb 2025

    682 Impressions

    0 Retweets

    9 Likes

    1 Bookmark

    1 Reply

    0 Quotes

  22. ほぼ需要はなく自己満足のためですが、CVE-2024-55591に対応しましたw https://t.co/EXcJ9Y4pVN

    @tadmaddad

    1 Feb 2025

    125 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  23. CVE-2024-55591の件だけど、FortiOSって対象じゃなかったの?それともしれっと消した? https://t.co/VyvZgHontf

    @tadmaddad

    1 Feb 2025

    130 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  24. watchTowr Labs Team has released a proof of concept for CVE-2024-55591 https://t.co/N60GeKTZz5

    @GrimmAnalyst

    1 Feb 2025

    265 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. آسیب پذیری جدیدی با کد شناسایی CVE-2024-55591 برای فایروال Fortinet منتشر شده است. این آسیب پذیری از نوع bypass authentication بوده و باعث دسترسی هکرها سطح دسترسی admin به کنسول قدرتمند CLI این محصول می شود. علت آسیب پذیری سرور از نوع nodeJS می باشد. https://t.co/Poz3aKY03t https

    @AmirHossein_sec

    30 Jan 2025

    40 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. CVE-2024-55591 Exploit Code Released for FortiOS Flaw #CVE-2024-55591 #ExploitCode #Fortinet https://t.co/VlK8KK7NM2

    @pravin_karthik

    30 Jan 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 🚨CVE-2024-55591: Fortinet FortiOS Authentication Bypass Proof of Concept Link: https://t.co/Rr9IuEszS1 https://t.co/9nmLFtPLtl

    @TheAgent307

    29 Jan 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. CVE-2024-55591の件、watchTowr Labsが新たなに公開していたPoCだとログが残ることを確認できましたが、もうちょい試さなくては・・・。 https://t.co/Ly1AyL9m7l

    @tadmaddad

    29 Jan 2025

    322 Impressions

    0 Retweets

    5 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  29. Fortinet FortiOS Authentication Bypass (CVE-2024-55591 ) : https://t.co/efnX5i61jR A Fortinet FortiOS Authentication Bypass PoC : https://t.co/JCMKA4DFSB https://t.co/DZbUjCYNof

    @binitamshah

    29 Jan 2025

    2610 Impressions

    8 Retweets

    24 Likes

    9 Bookmarks

    0 Replies

    0 Quotes

  30. Fortinet FortiOS Authentication Bypass (CVE-2024-55591 ) : https://t.co/efnX5i61jR https://t.co/vV2Ir2yY2Z

    @binitamshah

    29 Jan 2025

    341 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  31. 🚨 ALERTE CYBER : Fortinet Compromise ! 🚨 CVE-2024-55591 frappe FortiOS/FortiProxy, permettant aux hackers d'éviter l'authentification et de prendre le contrôle total ! Une faille activement exploitée. #CyberSécurité #Fortinet #Hacking https://t.co/0AdGAqQazl

    @_F2po_

    29 Jan 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. 🚨 CYBER ALERT: Fortinet Compromised! 🚨 CVE-2024-55591 hits FortiOS/FortiProxy, allowing hackers to bypass authentication and gain full control! An actively exploited vulnerability. #CyberSecurity #Fortinet #Hacking https://t.co/0Pdc9x2C2j

    @_F2po_

    29 Jan 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. Fortinet FortiOS Authentication Bypass CVE-2024-55591 Query: HUNTER:/product.name="Fortinet Firewall" FOFA: product="FORTINET-Firewall" SHODAN: instances running fortigate: http.favicon.hash:945408572 ZoomEye Dork: app="Fortinet Firewall" #BugBounty #CyberSecurity https://t.co

    @HackingTeam777

    29 Jan 2025

    928 Impressions

    5 Retweets

    19 Likes

    11 Bookmarks

    0 Replies

    0 Quotes

  34. ⚠️ CISA adds Fortinet FortiOS vuln CVE-2024-55591 (CVSS 9.6) to KEV. Patch now! #CyberSecurity #CISAAlert 📷 https://t.co/h4VGBAKg52

    @OffenseLogic

    29 Jan 2025

    58 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. Appleのゼロデイ脆弱性、Fortiのゼロデイ(cve-2024-55591)の追加情報が出てきていました。 また海外のChange Healthcareで大規模なデータ侵害が発生したようです。 20250129 Security News - OSINT Quick SEC NEWS https://t.co/5DFKuKMId9

    @jp_sec48735

    28 Jan 2025

    69 Impressions

    0 Retweets

    6 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. Detección de CVE-2024-55591: vulnerabilidad crítica de día cero en FortiOS y FortiProxy de Fortinet explotada activamente. Fortinet ha confirmado que la vulnerabilidad se está explotando activamente, lo que requiere una acción inmediata. #ciberseguridad https://t.co/rkpq7jmaBR

    @EHCGroup

    28 Jan 2025

    66 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  37. 🚨 Alerta de Seguridad 🚨 Vulnerabilidad en FortiOS explotada para obtener acceso de superadministrador Una vulnerabilidad crítica de día cero en los productos #FortiOS y #FortiProxy de #Fortinet identificada como #CVE-2024-55591 está siendo explotada activamente, lo que permite

    @SegtiNet

    28 Jan 2025

    53 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  38. CVE-2024-55591Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 https://t.co/ZmSAD9dHcb https://t.co/3gSjoa518T

    @cyber_advising

    28 Jan 2025

    1042 Impressions

    9 Retweets

    24 Likes

    8 Bookmarks

    0 Replies

    0 Quotes

  39. 🚨 Critical Alert: FortiOS Authentication Bypass (CVE-2024-55591) Exposes Super Admin Access 🚨 A severe authentication bypass vulnerability in FortiOS has been discovered, allowing attackers to gain Super Admin privileges on affected systems. This flaw could enable complete… ht

    @IntCyberDigest

    28 Jan 2025

    236 Impressions

    0 Retweets

    5 Likes

    2 Bookmarks

    1 Reply

    0 Quotes

  40. En serio, ¿aún no parcheaste #fortinet CVE-2024-55591? Aquí tienes toda la info, el procedimiento que llevan adelante los atacantes, cómo detectarlo y cómo defenderte. Do it! https://t.co/5gsPOHPcnH

    @SeguInfo

    28 Jan 2025

    352 Impressions

    1 Retweet

    2 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  41. Fortinet FortiOS Authentication Bypass CVE-2024-55591 Query: HUNTER:/product.name="Fortinet Firewall" FOFA: product="FORTINET-Firewall" SHODAN: instances running fortigate: http.favicon.hash:945408572 ZoomEye Dork: app="Fortinet Firewall" https://t.co/SyR4KXxLL0

    @y1659rsgh

    28 Jan 2025

    9 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  42. NCA-02.011725 – NCERT Advisory – Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability (CVE-2024-55591) https://t.co/c2XQ6PpTeN

    @Shabnam_145

    28 Jan 2025

    70 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. 🚨 UPDATE: PoC Released for CVE-2024-55591, a vulnerability in the jsconsole functionality that could allow attackers to add a new administrative account. Nearly 45,000 hosts remain vulnerable as of January 27, 2025. Read: https://t.co/w2EAT9piYO

    @TheHackersNews

    28 Jan 2025

    20137 Impressions

    85 Retweets

    176 Likes

    35 Bookmarks

    3 Replies

    2 Quotes

  44. A critical zero-day vulnerability in Fortinet's FortiOS and FortiProxy products, tracked as CVE-2024-55591, allows attackers to gain super-admin privileges through an authentication bypass exploit. The vulnerability, which has been actively exploited since mid-November 2024, a...

    @CybrPulse

    28 Jan 2025

    76 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  45. Get FortiRekt, I am the Super_Admin Now - FortiOS Authentication Bypass CVE-2024-55591 - watchTowr Labs https://t.co/IzzxRKCn5c https://t.co/e2aqaPLgaT

    @secharvesterx

    28 Jan 2025

    100 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. Fortinet FortiOS Authentication Bypass CVE-2024-55591 Query: HUNTER:/product.name="Fortinet Firewall" FOFA: product="FORTINET-Firewall" SHODAN: instances running fortigate: http.favicon.hash:945408572 ZoomEye Dork: app="Fortinet Firewall" #BugBounty #CyberSecurity https://t.co

    @TodayCyberNews

    27 Jan 2025

    7555 Impressions

    39 Retweets

    157 Likes

    98 Bookmarks

    1 Reply

    0 Quotes

  47. Get FortiRekt, I Am The Super_Admin Now - Fortinet FortiOS Authentication Bypass CVE-2024-55591 https://t.co/wWPep6UqOu

    @tbbhunter

    27 Jan 2025

    1314 Impressions

    7 Retweets

    16 Likes

    2 Bookmarks

    1 Reply

    0 Quotes

  48. フォーティネットのFortiOSにおけるFortiRekt脆弱性(CVE-2024-55591)の解説とPoC(攻撃の概念実証コード)が公開された。watchTowrによるもの。jsconsole機能における認証回避。WebSocket接続を総当たりすることで、管理アカウントを追加可能。 https://t.co/fPwSnTwv4F

    @__kokumoto

    27 Jan 2025

    2348 Impressions

    7 Retweets

    34 Likes

    13 Bookmarks

    0 Replies

    2 Quotes

  49. 🚨 #FortiOS and #FortiProxy Auth Bypass (CVE-2024-55591) lets attackers gain super-admin access via Node.js websocket. Public exploit on GitHub; ~45K devices online (#ShadowServer, Jan 26). Update & secure admin interfaces! 🔒 ➡️ https://t.co/3g4DtbcPWE https://t.co/GHfMYB6Eu

    @leonov_av

    27 Jan 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. 🚨CVE-2024-55591: Fortinet FortiOS Authentication Bypass Proof of Concept Link: https://t.co/pC94Vb0T9p https://t.co/9lLNil3twO

    @DarkWebInformer

    27 Jan 2025

    21897 Impressions

    76 Retweets

    322 Likes

    164 Bookmarks

    1 Reply

    2 Quotes

Configurations