TRY NOW
Vulnerability

Fortinet Patches Exploited Zero-Day Vulnerability in FortiOS and FortiProxy

3 min. read
15/01/2025
By Laura Libeer
Fortinet Vulnerability

 TL;DR | Go Straight to the Fortinet Vulnerability Audit Report

Fortinet has fixed an authentication bypass vulnerability in FortiOS and FortiProxy that attackers have been using to hijack Fortinet firewalls and breach enterprise networks. This vulnerability is related to a report that cybersecurity company Arctic Wolf released on the 10th of January which reported that Fortinet FortiGate firewalls with Internet-exposed management interfaces have been under attack since mid-November. We have added a new report to Lansweeper that allows you to find vulnerable devices in need of the update.

FortiOS and FortiProxy Vulnerability CVE-2024-55591

Fortinet’s advisory describes the vulnerability tracked as CVE-2024-55591 as “An Authentication Bypass Using an Alternate Path or Channel vulnerability”. It affects FortiOS and FortiProxy and received a critical CVSS score of 9.6. A remote attacker could you use the vulnerability to gain super-admin privileges via by sending crafted requests to the Node.js websocket module.

According the Fortinet, attackers are exploiting this zero-day to create admin or local users on compromised devices and adding them to existing SSL VPN user groups or to new ones they also add. Attackers can also add or change firewall policies or use the above mentioned local users they added to log in to the SSL VPN to get a tunnel to the internal network.

This vulnerability seems to be related to report released by cybersecurity company Arctic Wolf  on the 10th of January that reports matching indicators of compromise and which says that Fortinet FortiGate firewalls with Internet-exposed management interfaces have been under attack since mid-November. Mostly likely CVE-2024-55591 has been the initial access vector in these attacks.

Update Vulnerable Fortinet Installations

Fortinet has released updates for the affected FortiOS and FortiProxy versions. Users are advised to update vulnerable instances to the latest version as soon as possible.

Product and VersionAffected VersionSolution
FortiOS 7.6Not affectedNot Applicable
FortiOS 7.4Not affectedNot Applicable
FortiOS 7.2Not affectedNot Applicable
FortiOS 7.07.0.0 through 7.0.16Upgrade to 7.0.17 or above
FortiOS 6.4Not affectedNot Applicable
FortiProxy 7.6Not affectedNot Applicable
FortiProxy 7.4Not affectedNot Applicable
FortiProxy 7.27.2.0 through 7.2.12Upgrade to 7.2.13 or above
FortiProxy 7.07.0.0 through 7.0.19Upgrade to 7.0.20 or above
FortiProxy 2.0Not affectedNot Applicable

Fortinet’s advisory also offered a possible workaround by disabling the HTTP/HTTPS administrative interface or by limiting what IP addresses can reach the administrative interface via local-in policies. You can find detailed instructions in the advisory

Discover Vulnerable Fortinet Installs

Our team has added a new reports to Lansweeper to help you locate vulnerable instances of FortiOS and FortiProxy. This will give you a list of instances of Fortinet products and their versions, so you can more easily check if they are all up to date. You can get the reports via the link below.

NO CREDIT CARD REQUIRED

Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.