Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2024-55591

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

POC

Reference

No PoCs from references.

Github

- https://github.com/0x7556/CVE-2024-55591

- https://github.com/20142995/nuclei-templates

- https://github.com/AlgoSecure/2025-fortigate-leak-checker

- https://github.com/Ostorlab/KEV

- https://github.com/UMChacker/CVE-2024-55591-POC

- https://github.com/binarywarm/exp-cmd-add-admin-vpn-CVE-2024-55591

- https://github.com/cyb3r-w0lf/nuclei-template-collection

- https://github.com/exfil0/CVE-2024-55591-POC

- https://github.com/k8gege/Ladon

- https://github.com/packetinside/CISA_BOT

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/rawtips/CVE-2024-55591

- https://github.com/rxerium/stars

- https://github.com/souzatyler/fortios-auth-bypass-check-CVE-2024-55591

- https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591

- https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591

- https://github.com/tadmaddad/fortidig

- https://github.com/tanjiti/sec_profile

- https://github.com/ums91/CISA_BOT

- https://github.com/virus-or-not/CVE-2024-55591

- https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591

- https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591

- https://github.com/zulloper/cve-poc