TTCSIRT – 440. 14.02.2025 – Cybersecurity Advisory: Fortinet FortiGate Authentication Bypass Zero-Day Vulnerability (CVE-2024-55591)

TTCSIRT – 440. 14.02.2025 – Cybersecurity Advisory: Fortinet FortiGate Authentication Bypass Zero-Day Vulnerability (CVE-2024-55591)

TT-CSIRT would like to bring to your attention a potential critical zero-day vulnerability impacting Fortinet FortiGate firewalls and FortiProxy devices. This vulnerability, tracked by Arctic Wolfas CVE-2024-55591, allows remote attackers to bypass authentication mechanisms and gain unauthorized administrative access to management interfaces.

Key Details:

  • Impact:
    • Unauthorized administrative logins.
    • Creation of new administrative accounts.
    • Exploitation of SSL VPN authentication.
    • Potential for unauthorized configuration changes.
  • Affected Versions:
    • FortiOS: Versions 7.0.0 through 7.0.16.
    • FortiProxy: Versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12.

Recommended Actions:

  1. Disable Public Management Interface: Ensure that management interfaces are not accessible over the public internet.
  2. Apply Updates: Monitor Fortinet’s official site for patches and apply them as soon as they become available.
  3. Review Logs: Audit device logs for any unauthorized access or suspicious activities.
  4. Implement Network Segmentation: Limit access to critical systems from potentially vulnerable devices.
  5. Restrict Access: Configure access to management interfaces using VPN or internal networks only. Disable HTTP/HTTPS administrative interface access if not required.

Additional Resources

For further information and updates on this vulnerability, please refer to the following resources:

If you have any queries, comments or require assistance, please feel free to contact the TT-CSIRT via contacts@ttcsirt.gov.tt

Act promptly to safeguard your systems against potential exploitation.