CVE-2024-55591
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
5Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
Analysis
FortiOS and FortiProxy contain an authentication bypass via the Node.js websocket module allowing unauthenticated remote attackers to gain super-admin privileges through crafted requests.
Technical Context
The CWE-288 authentication bypass exploits the Node.js websocket module in FortiOS/FortiProxy's management interface. Crafted websocket requests allow an unauthenticated attacker to obtain a session with super-admin privileges, providing complete control over the firewall configuration.
Affected Products
['FortiOS 7.0.0 through 7.0.16', 'FortiProxy 7.2.0 through 7.2.12', 'FortiProxy 7.0.0 through 7.0.19']
Remediation
Upgrade FortiOS/FortiProxy immediately. Restrict management interface access to trusted networks. Audit admin accounts for unauthorized additions. Check for modified firewall policies and VPN configurations.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today