CVE-2024-55591

CRITICAL KEV RANSOMWARE NUCLEI

Fortinet Fortiproxy < 7.0.20 - Authentication Bypass

Title source: rule

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

Exploits (10)

nomisec WORKING POC 76 stars
by watchtowrlabs · remote
https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591
nomisec SCANNER 68 stars
by watchtowrlabs · poc
https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591
nomisec WORKING POC 25 stars
by sysirq · infoleak
https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591
nomisec WORKING POC 12 stars
by exfil0 · remote
https://github.com/exfil0/CVE-2024-55591-POC
nomisec WORKING POC 8 stars
by virus-or-not · remote
https://github.com/virus-or-not/CVE-2024-55591
nomisec WORKING POC 3 stars
by sysirq · poc
https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591
nomisec WORKING POC 2 stars
by UMChacker · remote
https://github.com/UMChacker/CVE-2024-55591-POC
github SUSPICIOUS
by binarywarm · pythonpoc
https://github.com/binarywarm/exp-cmd-add-admin-vpn-CVE-2024-55591
nomisec SCANNER
by 0x7556 · poc
https://github.com/0x7556/CVE-2024-55591

Nuclei Templates (1)

Fortinet - Authentication Bypass
CRITICALVERIFIEDby rootxharsh,iamnoooob,pdresearch

Scores

CVSS v3 9.8
EPSS 0.9416
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2025-01-14
VulnCheck KEV 2025-01-14
ENISA EUVD EUVD-2024-52819
Ransomware Use Confirmed

Classification

CWE
CWE-288
Status published

Affected Products (2)

fortinet/fortiproxy < 7.0.20
fortinet/fortios < 7.0.17

Timeline

Published Jan 14, 2025
KEV Added Jan 14, 2025
Tracked Since Feb 18, 2026