PT-2025-1051 · Fortinet · Fortiproxy+1

Published

2025-01-14

·

Updated

2026-03-20

·

CVE-2024-55591

CVSS v2.0

10

Critical

AV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions FortiOS versions 7.0.0 through 7.0.16 FortiProxy versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12
Description An authentication bypass vulnerability in FortiOS and FortiProxy allows a remote attacker to gain super-admin privileges via crafted requests to the Node.js websocket module. This issue has been actively exploited in the wild since November 2024, with nearly 50,000 Fortinet firewall devices remaining exposed to the vulnerability as of January 22, 2025. Attackers can use this vulnerability to create administrative accounts, modify device settings, and gain access to internal systems.
Recommendations FortiOS versions 7.0.0 through 7.0.16: Upgrade to version 7.0.17 or later to mitigate the risk of exploitation. FortiProxy versions 7.0.0 through 7.0.19: Upgrade to version 7.0.20 or later to mitigate the risk of exploitation. FortiProxy versions 7.2.0 through 7.2.12: Upgrade to version 7.2.13 or later to mitigate the risk of exploitation. As a temporary workaround, consider restricting or disabling administrative HTTP/HTTPS interfaces to minimize the risk of exploitation.

Exploit

Fix

RCE

Authentication Bypass Using an Alternate Path or Channel

Weakness Enumeration

Related Identifiers

BDU:2025-00281
CVE-2024-55591
FORTINET_CVE2024_55591

Affected Products

Fortios
Fortiproxy