Recently, a critical zero-day vulnerability, tracked as CVE-2024-55591, was discovered in Fortinet’s FortiOS and FortiProxy firewalls. This vulnerability allows unauthenticated attackers to bypass authentication mechanisms and gain unauthorized access to the devices. The flaw has been actively exploited in the wild, making it crucial for organizations using Fortinet products to take immediate action.
The Vulnerability
CVE-2024-55591 resides within the Node.js websocket module of the affected devices. By exploiting this vulnerability, attackers can send specially crafted requests to the module, bypassing authentication checks and gaining access to the device. This access can then be leveraged to escalate privileges, potentially granting attackers super-admin rights.

Impact of Fortinet Authentication Bypass vulnerability
The successful exploitation of this vulnerability can have severe consequences for organizations:
- Data Breaches: Attackers can access sensitive data stored or transmitted through the firewall.
- System Compromise: Attackers can gain complete control of the device, potentially using it to launch further attacks against other systems within the network.
- Disruption of Services: The compromised firewall can be used to disrupt network traffic and services.
Affected Versions
The following versions of FortiOS and FortiProxy are affected by this Fortinet Authentication Bypass Vulnerability:
- FortiOS: Versions 7.0.0 through 7.0.16
- FortiProxy: Versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12
Mitigation
Fortinet has released security updates to address this vulnerability. Organizations using affected versions should apply the latest patches as soon as possible. Additionally, organizations can implement the following security measures:
- Monitor system logs for suspicious activity.
- Implement strong passwords and enable multi-factor authentication.
- Regularly review and update security configurations.
- Isolate vulnerable devices from the network if immediate patching is not possible.
Conclusion
The Fortinet authentication bypass vulnerability is a critical threat that requires immediate attention. Organizations using affected versions of FortiOS and FortiProxy should prioritize patching their devices and implementing additional security measures to protect their networks. By taking proactive steps to address this vulnerability, organizations can minimize the risk of exploitation and maintain the security of their critical infrastructure.
Meta Techs Can Help
Critical Fortinet Authentication Bypass Vulnerability: CVE-2024-55591 allows attackers to bypass authentication on FortiOS/FortiProxy, enabling data breaches and system control.
- Meta Techs Solutions:
- Rapid Patching: Apply critical security updates to affected devices.
- Intrusion Detection: Implement advanced IDS/IPS to detect and prevent attacks.
- Threat Hunting: Proactively search for signs of compromise.
- Security Assessments: Identify vulnerabilities and optimize security configurations.
- Managed Security Services: 24/7 monitoring, threat intelligence, and incident response.







