CVE-2024-55591: Execute unauthorized code or commands in Fortinet FortiOS
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
AI Analysis
Technical Summary
CVE-2024-55591 is an authentication bypass vulnerability classified under CWE-288, affecting Fortinet's FortiOS versions 7.0.0 through 7.0.16 and FortiProxy versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12. The vulnerability arises from improper handling of authentication in the Node.js websocket module used by these products. An attacker can send specially crafted requests that circumvent normal authentication mechanisms, thereby gaining super-admin privileges remotely without any prior authentication or user interaction. This elevated access allows the attacker to execute arbitrary code or commands on the affected device, potentially leading to full system compromise. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, making it highly dangerous. The CVSS v3.1 score of 9.6 reflects the critical impact on confidentiality, integrity, and availability, with confirmed exploitability and a widespread scope due to Fortinet's extensive market presence in network security appliances. Although no active exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly. Fortinet has acknowledged the issue and is expected to release patches, but no direct patch links are provided in the current data. The vulnerability affects core security infrastructure, increasing the risk to enterprise and service provider networks globally.
Potential Impact
The impact of CVE-2024-55591 is severe for organizations worldwide relying on Fortinet FortiOS and FortiProxy products. Successful exploitation grants attackers super-admin privileges, enabling full control over the affected device. This can lead to unauthorized access to sensitive network traffic, manipulation or disruption of firewall and VPN configurations, interception of confidential data, and potential lateral movement within the network. The compromise of these security appliances undermines the entire network security posture, potentially allowing attackers to bypass other security controls. Critical infrastructure, government agencies, financial institutions, and large enterprises that depend on Fortinet devices for perimeter defense and secure remote access are particularly at risk. The vulnerability's ease of exploitation and remote nature mean that attackers do not require prior access or user interaction, increasing the likelihood of widespread attacks once exploit code becomes available. The resulting operational disruption, data breaches, and reputational damage could be substantial.
Mitigation Recommendations
1. Immediate application of vendor-supplied patches once available is paramount; monitor Fortinet advisories closely for updates addressing CVE-2024-55591. 2. Until patches are applied, restrict access to FortiOS and FortiProxy management interfaces to trusted networks only, using network segmentation and firewall rules. 3. Implement strict ingress filtering and limit exposure of management interfaces to the internet to reduce attack surface. 4. Enable and review detailed logging and monitoring on Fortinet devices to detect anomalous websocket traffic or unauthorized access attempts. 5. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting suspicious websocket activity. 6. Conduct regular security audits and vulnerability assessments on Fortinet devices to ensure compliance with security best practices. 7. Consider deploying multi-factor authentication (MFA) for administrative access where supported to add an additional layer of defense. 8. Prepare incident response plans specifically addressing potential compromise of network security appliances. 9. Educate network administrators about the vulnerability and encourage vigilance for unusual device behavior or alerts. 10. If feasible, temporarily disable or limit the Node.js websocket module functionality until patches are applied, after validating operational impact.
Affected Countries
United States, China, Germany, United Kingdom, France, Japan, South Korea, India, Australia, Canada, Brazil, Russia, Netherlands, Singapore, United Arab Emirates
CVE-2024-55591: Execute unauthorized code or commands in Fortinet FortiOS
Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-55591 is an authentication bypass vulnerability classified under CWE-288, affecting Fortinet's FortiOS versions 7.0.0 through 7.0.16 and FortiProxy versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12. The vulnerability arises from improper handling of authentication in the Node.js websocket module used by these products. An attacker can send specially crafted requests that circumvent normal authentication mechanisms, thereby gaining super-admin privileges remotely without any prior authentication or user interaction. This elevated access allows the attacker to execute arbitrary code or commands on the affected device, potentially leading to full system compromise. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, making it highly dangerous. The CVSS v3.1 score of 9.6 reflects the critical impact on confidentiality, integrity, and availability, with confirmed exploitability and a widespread scope due to Fortinet's extensive market presence in network security appliances. Although no active exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly. Fortinet has acknowledged the issue and is expected to release patches, but no direct patch links are provided in the current data. The vulnerability affects core security infrastructure, increasing the risk to enterprise and service provider networks globally.
Potential Impact
The impact of CVE-2024-55591 is severe for organizations worldwide relying on Fortinet FortiOS and FortiProxy products. Successful exploitation grants attackers super-admin privileges, enabling full control over the affected device. This can lead to unauthorized access to sensitive network traffic, manipulation or disruption of firewall and VPN configurations, interception of confidential data, and potential lateral movement within the network. The compromise of these security appliances undermines the entire network security posture, potentially allowing attackers to bypass other security controls. Critical infrastructure, government agencies, financial institutions, and large enterprises that depend on Fortinet devices for perimeter defense and secure remote access are particularly at risk. The vulnerability's ease of exploitation and remote nature mean that attackers do not require prior access or user interaction, increasing the likelihood of widespread attacks once exploit code becomes available. The resulting operational disruption, data breaches, and reputational damage could be substantial.
Mitigation Recommendations
1. Immediate application of vendor-supplied patches once available is paramount; monitor Fortinet advisories closely for updates addressing CVE-2024-55591. 2. Until patches are applied, restrict access to FortiOS and FortiProxy management interfaces to trusted networks only, using network segmentation and firewall rules. 3. Implement strict ingress filtering and limit exposure of management interfaces to the internet to reduce attack surface. 4. Enable and review detailed logging and monitoring on Fortinet devices to detect anomalous websocket traffic or unauthorized access attempts. 5. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting suspicious websocket activity. 6. Conduct regular security audits and vulnerability assessments on Fortinet devices to ensure compliance with security best practices. 7. Consider deploying multi-factor authentication (MFA) for administrative access where supported to add an additional layer of defense. 8. Prepare incident response plans specifically addressing potential compromise of network security appliances. 9. Educate network administrators about the vulnerability and encourage vigilance for unusual device behavior or alerts. 10. If feasible, temporarily disable or limit the Node.js websocket module functionality until patches are applied, after validating operational impact.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fortinet
- Date Reserved
- 2024-12-09T11:19:49.470Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b6247d717aace26c49
Added to database: 10/21/2025, 7:06:30 PM
Last enriched: 2/26/2026, 11:22:23 PM
Last updated: 3/22/2026, 5:12:17 AM
Views: 120
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.