Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55591: Execute unauthorized code or commands in Fortinet FortiOS

0
Critical
VulnerabilityCVE-2024-55591cvecve-2024-55591
Published: Tue Jan 14 2025 (01/14/2025, 14:08:34 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:22:23 UTC

Technical Analysis

CVE-2024-55591 is an authentication bypass vulnerability classified under CWE-288, affecting Fortinet's FortiOS versions 7.0.0 through 7.0.16 and FortiProxy versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12. The vulnerability arises from improper handling of authentication in the Node.js websocket module used by these products. An attacker can send specially crafted requests that circumvent normal authentication mechanisms, thereby gaining super-admin privileges remotely without any prior authentication or user interaction. This elevated access allows the attacker to execute arbitrary code or commands on the affected device, potentially leading to full system compromise. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, making it highly dangerous. The CVSS v3.1 score of 9.6 reflects the critical impact on confidentiality, integrity, and availability, with confirmed exploitability and a widespread scope due to Fortinet's extensive market presence in network security appliances. Although no active exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly. Fortinet has acknowledged the issue and is expected to release patches, but no direct patch links are provided in the current data. The vulnerability affects core security infrastructure, increasing the risk to enterprise and service provider networks globally.

Potential Impact

The impact of CVE-2024-55591 is severe for organizations worldwide relying on Fortinet FortiOS and FortiProxy products. Successful exploitation grants attackers super-admin privileges, enabling full control over the affected device. This can lead to unauthorized access to sensitive network traffic, manipulation or disruption of firewall and VPN configurations, interception of confidential data, and potential lateral movement within the network. The compromise of these security appliances undermines the entire network security posture, potentially allowing attackers to bypass other security controls. Critical infrastructure, government agencies, financial institutions, and large enterprises that depend on Fortinet devices for perimeter defense and secure remote access are particularly at risk. The vulnerability's ease of exploitation and remote nature mean that attackers do not require prior access or user interaction, increasing the likelihood of widespread attacks once exploit code becomes available. The resulting operational disruption, data breaches, and reputational damage could be substantial.

Mitigation Recommendations

1. Immediate application of vendor-supplied patches once available is paramount; monitor Fortinet advisories closely for updates addressing CVE-2024-55591. 2. Until patches are applied, restrict access to FortiOS and FortiProxy management interfaces to trusted networks only, using network segmentation and firewall rules. 3. Implement strict ingress filtering and limit exposure of management interfaces to the internet to reduce attack surface. 4. Enable and review detailed logging and monitoring on Fortinet devices to detect anomalous websocket traffic or unauthorized access attempts. 5. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting suspicious websocket activity. 6. Conduct regular security audits and vulnerability assessments on Fortinet devices to ensure compliance with security best practices. 7. Consider deploying multi-factor authentication (MFA) for administrative access where supported to add an additional layer of defense. 8. Prepare incident response plans specifically addressing potential compromise of network security appliances. 9. Educate network administrators about the vulnerability and encourage vigilance for unusual device behavior or alerts. 10. If feasible, temporarily disable or limit the Node.js websocket module functionality until patches are applied, after validating operational impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-12-09T11:19:49.470Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b6247d717aace26c49

Added to database: 10/21/2025, 7:06:30 PM

Last enriched: 2/26/2026, 11:22:23 PM

Last updated: 3/22/2026, 5:12:17 AM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses