Auth Bypass Vulnerability Exploited in Wild to Hijack Fortinet Firewalls

15 January 2025 [NO.TCSA : 20250115-1-1-E]

PUBLISHED:
15 January 2025

Auth Bypass Vulnerability Exploited in Wild to Hijack Fortinet Firewalls

Attackers are exploiting a newly discovered authentication bypass vulnerability in FortiOS and FortiProxy, enabling them to compromise Fortinet firewalls and infiltrate enterprise networks. This critical vulnerability allows remote attackers to gain super-admin privileges by sending malicious requests to the Node.js WebSocket module, which is part of the system’s architecture. The security flaw is designated with CVE-2024-55591 and has 9.8 (Critical) CVSSv3 score.

Upon successful exploitation, attackers create unauthorized admin or local user accounts on the compromised devices. These accounts are either added to existing SSL VPN user groups or placed in newly created groups, giving them persistent and elevated access to the affected systems. This enables them to not only take over the devices but also maintain access to the broader network, posing a severe security risk to enterprises using Fortinet solutions.

Affected Versions

The vulnerability impacts the following versions of FortyOS and FortyProxy:

  • FortiOS 7.0 (7.0.0 through 7.0.16)
  • FortiProxy 7.2 (7.2.0 through 7.2.12)
  • FortiProxy 7.0 (7.0.0 through 7.0.19)

Mitigation

  • FortiOS 7.0:Upgrade to 7.0.17 or above
  • FortiProxy 7.2:Upgrade to 7.2.13 or above
  • FortiProxy 7.0:Upgrade to 7.0.20 or above

Fortinet also advised admins to disable the HTTP/HTTPS administrative interface or limit what IP addresses can  reach the administrative interface via local-in policies as a workaround.

TechCERT strongly encourages the application of these updates immediately.

More Information

15 January 2025 [NO.TCSA : 20250115-1-1-E]

Auth Bypass Vulnerability Exploited in Wild to Hijack Fortinet Firewalls

READ MORE READ MORE
16 April 2024 [NO.TCSA : 20240416-1-1-P]

Critical Command Injection Vulnerability Found in Palo Alto Networks GlobalProtect

READ MORE READ MORE
9 February 2024 [NO.TCSA : 20240209-1-1-P]

Critical Remote Code Execution Vulnerability Found in FortiOS SSL VPN

READ MORE READ MORE
Read More BACK TO THREAT BULLETIN