Webinar: Navigate the ASM Landscape with KuppingerCole’s Leadership Compass. Register now Webinar: Navigate the ASM Landscape
Back to Blog

Emerging Threat: Fortinet CVE-2024-55591

Emma Zaballos
Emma Zaballos Product Marketing Manager

What is CVE-2024-55591? 

On January 14, 2025, Fortinet disclosed a new critical (CVSS 9.6) authentication bypass vulnerability affecting FortiOS and FortiProxy. This vulnerability, CVE-2024-55591, allows unauthenticated remote attackers to target the Node.js WebSocket module of the administrative interface and potentially gain super-admin privileges. 

What assets are affected by CVE-2024-55591? 

The following assets are affected by CVE-2024-55591: 

  • FortiOS version 7.0.0 through 7.0.16 
  • FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12

The following assets are NOT affected by CVE-2024-55591:

  • FortiOS 7.2 through 7.6
  • FortiOS 6.4
  • FortiProxy 7.4 through 7.6
  • FortiProxy 2.0

Are fixes available? 

Fortinet has released patches for all affected versions and recommends upgrading vulnerable assets as soon as possible. 

  • FortiOS version 7.0.0 through 7.0.16: upgrade to 7.0.17 or above
  • FortiProxy version 7.0.0 through 7.0.19: upgrade to 7.2.13 or above
  • FortiProxy version 7.2.0 through 7.2.12: upgrade to 7.0.20 or above

If patching is not feasible, Fortinet recommends restricting access to the administrative interface. Organizations can either disable the HTTP/HTTPS administrative interface entirely or use local-in policies to limit IP addresses that can access the administrative interface.

Fortinet has also provided Indicators of Compromise (IoCs) in their vendor advisory

Is CVE-2024-55591 being actively exploited? 

Researchers at Arctic Wolf reported on January 10th, 2025 that this vulnerability may have been actively exploited in the wild since November 2024 as part of a larger campaign targeting exposed FortiGate firewall devices. As of January 15th, there is no public proof of concept available for CVE-2024-55591. 

How is CyCognito helping customers identify assets vulnerable to CVE-2024-55591? 

CyCognito customers can review potentially affected assets within the platform to identify whether any assets are running these services with default HTTP/HTTPS ports (tcp/443, tcp/80). Users also have access to an emerging threat advisory within the CyCognito platform. 

Figure 1: The alert sent by CyCognito for CVE-2024-55591

It’s worth noting that this comes on the heels of other serious vulnerabilities affecting FortiOS products. For more information about those vulnerabilities and CyCognito’s response, check out our blog posts covering CVE-2024-23113 and CVE-2024-47575

How can CyCognito help your organization? 

CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive dashboard product tour. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our Contact Us page to schedule a demo.



Subscribe to our newsletter

Subscribe now to get the latest insights delivered straight to your inbox.

Request a free scan

See Exactly What Attackers See

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally .

Request a Scan
Top Attack Paths