Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55591: Execute unauthorized code or commands in Fortinet FortiOS

0
Critical
VulnerabilityCVE-2024-55591cvecve-2024-55591
Published: Tue Jan 14 2025 (01/14/2025, 14:08:34 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:16:01 UTC

Technical Analysis

CVE-2024-55591 is an authentication bypass vulnerability classified under CWE-288, affecting Fortinet's FortiOS and FortiProxy products. The flaw exists in the Node.js websocket module implementation within these products, allowing an unauthenticated remote attacker to send specially crafted requests that bypass normal authentication mechanisms. This bypass grants the attacker super-admin privileges, effectively allowing them to execute arbitrary code or commands on the affected device. The vulnerability impacts FortiOS versions 7.0.0 through 7.0.16 and FortiProxy versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12. Given the critical nature of Fortinet devices in enterprise and service provider networks, exploitation could lead to full device compromise, enabling attackers to manipulate firewall rules, intercept or redirect traffic, deploy malware, or disrupt network availability. The vulnerability has a CVSS v3.1 base score of 9.6, reflecting its high exploitability (network vector, no privileges or user interaction required) and severe impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability's public disclosure and critical severity necessitate urgent attention. Fortinet has not yet published patches or mitigation details at the time of this report, increasing the urgency for organizations to implement interim protective controls.

Potential Impact

For European organizations, the impact of CVE-2024-55591 is significant due to the widespread use of Fortinet FortiOS and FortiProxy in enterprise, government, and critical infrastructure networks. Successful exploitation can lead to complete takeover of network security appliances, allowing attackers to bypass firewall protections, exfiltrate sensitive data, disrupt services, or establish persistent footholds. This threatens the confidentiality of personal and corporate data, the integrity of network configurations, and the availability of critical network services. Sectors such as finance, healthcare, energy, and telecommunications are particularly vulnerable due to their reliance on Fortinet products for perimeter defense and secure remote access. The ability to gain super-admin privileges remotely without authentication makes this vulnerability attractive for advanced persistent threat (APT) groups and cybercriminals targeting European entities. The lack of known exploits in the wild currently provides a window for proactive defense, but the risk of rapid weaponization is high given the criticality and ease of exploitation.

Mitigation Recommendations

1. Immediately inventory all Fortinet FortiOS and FortiProxy devices to identify affected versions (7.0.0 through 7.0.16 for FortiOS and 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 for FortiProxy). 2. Apply vendor patches as soon as they become available; monitor Fortinet advisories closely. 3. Restrict access to management interfaces, especially websocket endpoints, to trusted internal networks only; block access from untrusted or public networks. 4. Implement network segmentation to isolate Fortinet devices from general user networks and limit lateral movement. 5. Deploy strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious websocket traffic patterns. 6. Enable and review detailed logging on Fortinet devices to detect anomalous authentication attempts or privilege escalations. 7. Conduct regular security audits and penetration tests focusing on Fortinet device configurations and access controls. 8. Educate network administrators on this vulnerability and enforce the principle of least privilege for administrative access. 9. Consider temporary compensating controls such as disabling websocket modules if feasible without disrupting operations. 10. Prepare incident response plans to quickly contain and remediate potential compromises involving Fortinet devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-12-09T11:19:49.470Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b6247d717aace26c49

Added to database: 10/21/2025, 7:06:30 PM

Last enriched: 10/21/2025, 7:16:01 PM

Last updated: 10/30/2025, 6:02:25 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats