CVE-2024-55591
CRITICAL KEV RANSOMWARE NUCLEIFortinet Fortiproxy < 7.0.20 - Authentication Bypass
Title source: ruleDescription
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
Exploits (10)
nomisec
WORKING POC
76 stars
by watchtowrlabs · remote
https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591
nomisec
SCANNER
68 stars
by watchtowrlabs · poc
https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591
nomisec
WORKING POC
25 stars
by sysirq · infoleak
https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591
nomisec
WORKING POC
3 stars
by sysirq · poc
https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591
github
SUSPICIOUS
by binarywarm · pythonpoc
https://github.com/binarywarm/exp-cmd-add-admin-vpn-CVE-2024-55591
Nuclei Templates (1)
Fortinet - Authentication Bypass
CRITICALVERIFIEDby rootxharsh,iamnoooob,pdresearch
Scores
CVSS v3
9.8
EPSS
0.9416
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2025-01-14
VulnCheck KEV
2025-01-14
ENISA EUVD
EUVD-2024-52819
Ransomware Use
Confirmed
Classification
CWE
CWE-288
Status
published
Affected Products (2)
fortinet/fortiproxy
< 7.0.20
fortinet/fortios
< 7.0.17
Timeline
Published
Jan 14, 2025
KEV Added
Jan 14, 2025
Tracked Since
Feb 18, 2026