Vulnerability affecting FortiOS and FortiProxy

This section contains time sensitive announcements about specific cyber threats, vulnerabilities and scams. Each alert has information you need to be aware of, and what actions to take to mitigate any risk to you or your organisation.

Subscribe to our updates to be notified as soon as we publish an alert.

3:50pm, 15 January 2025

TLP Rating: Clear

Vulnerability affecting FortiOS and FortiProxy

CVE-2024-55591 is an Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy that may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js WebSocket module.

The NCSC is aware of active exploitation of this vulnerability. 

An upgrade to the versions outlined in the vendor advisory is required.

What's happening

Systems affected

FortiOS

  • 7.0.0 through 7.0.16


FortiProxy

  • 7.0.0 through 7.0.19
  • 7.2.0 through 7.2.12

What this means

FortiOS and FortiProxy versions listed above are vulnerable to CVE-2024-55591.

What to look for

How to tell if you're at risk

If you are running the vulnerable versions of FortiOS or FortiProxy listed above. 

What to do

Prevention

FortiOS needs to be upgraded to:

  • 7.0.17 or above

FortiProxy versions that are affected need to be upgraded. 

  • 7.0.0 through 7.0.19 need to be upgraded to  7.0.20 or above.
  • 7.2.0 through 7.2.12 need to be upgraded to 7.2.13 or above.

More information