Security advisories

Actively Exploited Fortinet Vulnerability

January 14, 2025 | 2 MINS READ

Speak With A Security Expert Now

TALK TO AN EXPERT

THE THREAT

On January 14th, Fortinet disclosed an actively exploited critical zero-day vulnerability impacting multiple versions of FortiOS and FortiProxy. The vulnerability, tracked as CVE-2024-55591 (CVSS: 9.6) is an Authentication Bypass Using an Alternate Path or Channel vulnerability. Exploitation would allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module. Fortinet states that threat actors have been observed performing various operations, including creating admin and local user accounts with random usernames, adding local users to SSL VPN user groups, modifying configurations such as firewall policies, and using the SSL VPN to establish tunnels into the internal network. Fortinet's disclosure confirms that CVE-2024-55591 has been exploited in the wild. 

As exploitation has been confirmed, it is critical that organizations using FortiOS and FortiProxy apply the relevant security patches or alternative mitigations immediately.

What we’re doing about it

What you should do about it

Additional information

Public reports indicate that exploitation activity had been observed as early as mid-November 2024. Given the timeframe between the first observation and public acknowledgement of the vulnerability as a zero-day, organizations must immediately apply patches or implement the temporary mitigation actions as soon as possible. In addition, defenders should also perform retroactive threat hunts using the Indicators of Compromise (IoCs) provided by Fortiguard Labs to identify successful exploitation, or post-exploitation activity. Lateral movement has reportedly been observed as well, highlighting the importance of defenders taking action immediately.

CVE-2024-55591: Impacted Product List

FortiOS:

FortiProxy:

Fortinet vulnerabilities have a history of being exploited by threat actors. On October 9th 2024, a Remote Code Execution vulnerability in Fortinet FortiOS, tracked as CVE-2024-23113 (CVSS: 9.8), was added to CISA’s Known Exploited Vulnerability (KEV) catalog. Past exploitation may indicate that threat actors are already familiar with the platform and have an interest in targeting these devices.

References:

[1] https://www.fortiguard.com/psirt/FG-IR-24-535 
[2] https://nvd.nist.gov/vuln/detail/CVE-2024-55591

View Most Recent Advisories