- published 1/21/25 6:03 AM •
- updated 15 January 2025 •
- 3 min Read
Critical Vulnerability in FortiOS and FortiProxy
Alert Rating
Audience
Corporations, Government
On this page
Critical Vulnerability in FortiOS and FortiProxy
This critical flaw has been actively exploited in the wild. Fortinet has observed threat actors performing malicious post-exploitation activities, including the creation of random administrative and local user accounts, modification of system configurations (e.g., firewall policies), and the use of SSL VPN for unauthorized access to internal network.
- CVE Identifier: CVE-2024-55591
- Severity: CVSSv3 Score 9.6 Critical
- Vulnerability Type: Authentication Bypass (CWE-288)
- Impact: Remote unauthenticated attackers can gain super-admin access to FortiOS and FortiProxy devices.
Affected Versions
- FortiOS 7.0.0 through 7.0.16
- FortiProxy 7.0.0 through 7.0.19
- FortiProxy 7.2.0 through 7.2.12
Fixed Versions
- FortiOS 7.0: Upgrade to 7.0.17 or above
- FortiProxy 7.0: Upgrade to 7.0.20 or above
- FortiProxy 7.2: Upgrade to 7.2.13 or above
Take Action
Protect yourself
- Upgrade affected versions of FortiOS and FortiProxy to fixed versions immediately.
- Monitor systems for indicators of compromise and Conduct a thorough security assessment of potentially affected systems.
GET INVOLVED
Make a Difference
Other Threats
20 January 2025
Critical Vulnerability in F5 Traffix SDC
A critical vulnerability has been discovered in F5 Traffix SDC, linked to Apache Tomcat, which could allow attackers to gain unauthorized access to compromised systems.
Protecting
Corporations, Government
17 January 2025
NVIDIA has released security updates to address multiple vulnerabilities in the NVIDIA Container Toolkit and NVIDIA GPU Operator.
Protecting
Corporations, Government
16 January 2025
Critical Vulnerability in FortiSwitch Devices
A critical vulnerability (CVE-2023-37936) has been discovered in multiple versions of Fortinet FortiSwitch devices. This vulnerability, classified as a use of hard-coded cryptographic key [CWE-321], allows a remote unauthenticated attacker in possession of the key to execute unauthorized code via crafted cryptographic request.
Protecting
Corporations, Government