CVE-2024-55591

CRITICAL
2025-01-14 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 28, 2026 - 18:03 vuln.today
Added to CISA KEV
Oct 24, 2025 - 12:54 cisa
CISA KEV
EUVD Exploitation Confirmed
Oct 24, 2025 - 12:54 euvd
EUVD KEV
PoC Detected
Oct 24, 2025 - 12:54 vuln.today
Public exploit code
CVE Published
Jan 14, 2025 - 14:15 nvd
CRITICAL 9.8

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

Analysis

FortiOS and FortiProxy contain an authentication bypass via the Node.js websocket module allowing unauthenticated remote attackers to gain super-admin privileges through crafted requests.

Technical Context

The CWE-288 authentication bypass exploits the Node.js websocket module in FortiOS/FortiProxy's management interface. Crafted websocket requests allow an unauthenticated attacker to obtain a session with super-admin privileges, providing complete control over the firewall configuration.

Affected Products

['FortiOS 7.0.0 through 7.0.16', 'FortiProxy 7.2.0 through 7.2.12', 'FortiProxy 7.0.0 through 7.0.19']

Remediation

Upgrade FortiOS/FortiProxy immediately. Restrict management interface access to trusted networks. Audit admin accounts for unauthorized additions. Check for modified firewall policies and VPN configurations.

Priority Score

213
Low Medium High Critical
KEV: +50
EPSS: +94.2
CVSS: +49
POC: +20

Share

CVE-2024-55591 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy