Book a demo

Complete this form to speak with one
of our sales representatives.

Fortinet Firewall Authentication Bypass Vulnerability (CVE-2024-55591)


Summary

As per a recent update from Fortinet, Exploitation of CVE-2024-55591, a recently disclosed authentication bypass vulnerability in FortiOS and FortiProxy, allows remote attackers to achieve super-admin privileges. By sending specially crafted requests to the Node.js WebSocket module, attackers can exploit this zero-day vulnerability to gain unauthorized access.

Fortinet reports that attackers exploiting the zero-day vulnerability in the wild are creating randomly generated admin or local user accounts on compromised devices. These accounts are then added to existing SSL VPN user groups or new groups created by the attackers.

Severity: CRITICAL

CVSSv3 Score: 9.6


Timeline

Nov 16-23, 2024 – Vulnerability scanning 

Nov 22-27, 2024 – Reconnaissance

Dec 4-7, 2024 – SSL VPN configuration

Dec 16-27, 2024 – Lateral Movement

Jan 14, 2025 – Fortinet Published the Vulnerability 


Products Affected


Mitigation/Solution

  1. Apply Security Patches: It is strongly recommended to apply the latest patches immediately to address the vulnerability. The vulnerability affects the following versions:
    • Fortinet FortiOS: 7.0.0 to 7.0.16 (fixed in 7.0.17 or later)
    • Fortinet FortiProxy: 7.2.0 to 7.2.12 (fixed in 7.2.13 or later) and 7.0.0 to 7.0.19 (fixed in 7.0.20 or later).
  1. Restrict Management Interface Access: Customers should ensure that firewall management interfaces are not publicly accessible and restrict access to administrative interfaces by allowing only specific IP addresses
  2. Monitor for Indicators of Compromise (IoCs): Review network logs for unusual activities, such as unexpected administrative actions or unauthorized configuration changes.
TypeValuesContext
IP45.55.158[.]47
[most used IP address]
137.184.65[.]
71149.22.94[.]
37155.133.4[.]
175157.245.3[.]
251167.71.245[.]
1023.27.140[.]
6531.192.107[.]
16537.19.196[.]
6564.190.113[.]
2566.135.27[.]
17887.249.138[.]47
Threat Actor  has been seen using these IP addresses for login to management interface
UserGujhmkEd8x4kG0xgeyPvnw81A
lg7c4Ypda8aKmi8p41a2n6t8ah1
t6M4ix9f
Randomly created user/admin users
IP 1.1.1.1127.0.0.12.2.
2.28.8.8.
88.8.4.4
login activity log with random scrip and dstip
Note- Please note that the IP parameters are not the actual source IP addresses of the attack traffic, they are generated arbitrarily by the attacker as a parameter. Because of this they should not be used for any blocking.


Snowbit Response

  1. We have onboarded the IOCs highlighted above into the Coralogix custom threat intel feed for real-time detection
  2. We have scanned SRC customer environments with Fortinet Firewall integrations for the aforesaid IOCs
  3. We have implemented the necessary alerts to monitor activities associated with this vulnerability. Here is the list of newly added alerts:

     
  1. If you need further assistance with respect to this vulnerability, our Security Resource Centre (SRC) and Research team would be happy to engage. Please reach out to your Account Manager, TAM or SRC SPoC in this regard


Reference

[1] https://www.fortiguard.com/psirt/FG-IR-24-535

[2] https://arcticwolf.com/resources/blog/console-chaos-targets-fortinet-fortigate-firewalls/

[3]https://www.rapid7.com/blog/post/2025/01/16/etr-fortinet-firewalls-hit-with-new-zero-day-attack-older-data-leak/[4]https://www.bleepingcomputer.com/news/security/fortinet-warns-of-auth-bypass-zero-day-exploited-to-hijack-firewalls/