CVE Vulnerabilities

CVE-2024-55591

Authentication Bypass Using an Alternate Path or Channel

Published: Jan 14, 2025 | Modified: Oct 24, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

Weakness

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

NameVendorStart VersionEnd Version
FortiproxyFortinet7.0.0 (including)7.0.20 (excluding)
FortiproxyFortinet7.2.0 (including)7.2.13 (excluding)
FortiosFortinet7.0.0 (including)7.0.17 (excluding)

Potential Mitigations

References