CVE-2024-55591 Detection: Critical Zero-Day Vulnerability in Fortinet FortiOS and FortiProxy Actively Exploited in the Wild

[post-views]
January 16, 2025 · 4 min read
CVE-2024-55591 Detection: Critical Zero-Day Vulnerability in Fortinet FortiOS and FortiProxy Actively Exploited in the Wild

In mid-January 2025, a new Fortinet FortiOS authentication bypass vulnerability, CVE-2024-55591, emerged as a severe threat to thousands of organizations at risk of compromise. This critical zero-day flaw exposes FortiGate firewall devices to potential compromise, allowing remote attackers to gain super-admin privileges on the affected systems. Fortinet has confirmed that the vulnerability is actively being exploited in the wild, requiring immediate action.

Update: On January 28, 2025, watchTowr Labs recently released a public PoC exploit code for CVE-2024-55591, now available on GitHub, along with the technical details in their dedicated research. With Shadowserver reporting nearly 50K affected instances online, defenders strongly encourage everyone using the vulnerable versions to take swift action and apply all the necessary patches. Explore how to proactively detect CVE-2024-55591 exploit attempts to outscale cyber attacks and find the Fortinet FortiOS authentication bypass Fortinet FortiOS authentication bypass vulnerability analysis below.

Detect Fortinet FortiOS Authentication Bypass CVE-2024-55591 Exploitation Attempts

Proactive detection of vulnerability exploitation continues to be a top priority in cybersecurity due to the steady rise in the number of identified vulnerabilities. With the critical severity and widespread exploitation of CVE-2024-55591, security professionals require a reliable source of detection content to detect potential attacks on time. 

SOC Prime Platform for collective cyber defense addresses this need by providing the industry’s first CTI-enriched detection rule feed for both emerging and existing threats. Backed by a comprehensive product suite, the platform supports advanced threat detection, AI-powered detection engineering, and automated threat hunting.

SOC Prime Team has recently released a new Sigma rule to detect CVE-2024-55591 exploitation attempts. The detection is based on publicly available research along with PoC code and requires weblogs from a front-end source such as WAF or a reverse proxy with POST headers data gathered before the requests reach any of the mentioned products. The rule is aligned with MITRE ATT&CK®, addressing the Initial Access tactic and the corresponding Exploit Public-Facing Application (T1190) technique.

Possible CVE-2024-55591 (FortiOS and FortiProxy Authentication bypass) Exploitation Patterns (via webserver)

Hit the Explore Detection button below to immediately access the entire set of Sigma rules addressing Fortinet FortiOS authentication bypass vulnerability aka CVE-2024-55591 exploitation attempts. The the rules are mapped to the MITRE ATT&CK framework, enriched with extensive threat intel, and compatible with 30+ SIEM, EDR, and Data Lake solutions.

Explore Detections

To proceed with the investigation, cyber defenders can seamlessly hunt for IOCs provided in the Fortinet advisory. Rely on SOC Prime’s Uncoder AI to create custom IOC-based queries in a matter of seconds and automatically work with them in your chosen SIEM or EDR environment. Previously available only to corporate clients, Uncoder AI is now accessible to individual researchers, offering its full capabilities. Check out the details here.

CVE-2024-55591 Analysis

On January 14, 2025, Fortinet issued a security advisory regarding CVE-2024-55591, a critical authentication bypass vulnerability impacting FortiOS versions 7.0.0 to 7.0.16, FortiProxy versions 7.0.0 to 7.0.19, and FortiProxy versions 7.2.0 to 7.2.12. The flaw allows an unauthenticated, remote attacker to exploit the vulnerability by sending a crafted request to the Node.js websocket module. If successfully exploited, the attacker can gain super-admin privileges on the affected device. 

WatchTowr Labs recently issued a public PoC exploit for this critical Fortinet FortiOS authentication bypass, CVE-2024-55591, accompanied by technical details in their dedicated report.

Fortinet has confirmed the in-the-wild exploitation of CVE-2024-55591, with research by Arctic Wolf uncovering a malicious campaign active since mid-November 2024 and leveraging the vulnerability in limelight to compromise FortiGate firewall devices with Internet-exposed management interfaces. According to the researchers, the campaign included unauthorized administrative access to firewall management interfaces, the creation of new user accounts, the use of those accounts for SSL VPN authentication, and multiple other modifications to device configurations helping threat actors to establish a path to the internal network. 

Fortinet’s advisory suggests users disable the HTTP/HTTPS administrative interface or restrict access to it by using local-in policies to limit which IP addresses can reach the interface. Additionally, users are urged to upgrade to the following safe versions, if possible: FortiOS 7.0.17 or higher (for FortiOS 7.0), FortiProxy 7.0.20 or higher (for FortiProxy 7.0), and FortiProxy 7.2.13 or higher (for FortiProxy 7.2).

SOC Prime Platform for collective cyber defense enables security teams to outscale cyber threats of any scale and sophistication, including CVEs in popular software products that most organizations rely on while helping them to risk-optimize the security posture. 

Table of Contents

Was this article helpful?

Like and share it with your peers.
Join SOC Prime's Detection as Code platform to improve visibility into threats most relevant to your business. To help you get started and drive immediate value, book a meeting now with SOC Prime experts.

Related Posts