CVE-2024-55591 Critical Zero-Day Vulnerability in Fortinet FortiOS and FortiProxy Actively Exploited in the Wild

Berkay Soylu
Posted:
February 3, 2025
Home
Posts
Detection Engineer
CVE-2024-55591 Critical Zero-Day Vulnerability in Fortinet FortiOS and FortiProxy Actively Exploited in the Wild
Contents

CVE-2024-55591 An Authentication Bypass Using an Alternate Path or Channel vulnerability affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

As you read you will also learn:          

  • Introduction:              Overview of CVE-2024-55591
  • Severity & Affected Versions:  Information on affected versions.
  • Exploitation Status: Vulnerability Exploitation In the Wild   
  • Vulnerability Details:     Explanation and details of CVE-2024-55591          
  • Mitigations:           Suggestions for mitigation for CVE-2024-55591  
  • Conclusion:                Summary of key findings and potential risks           
  • References:                Citations and sources for further reading
  • IOC: Indicator Of Compromises of CVE-2024-55591 

TL;DR

CVE-2024-55591 is a critical authentication bypass vulnerability (CVSS 9.8) in Fortinet's FortiOS and FortiProxy, allowing attackers to remotely gain super-admin privileges via crafted requests to the Node.js WebSocket module. Actively exploited since November 2024, over 48,000 devices remain unpatched as of January 2025. This blog details exploitation tactics, detection methods, and mitigation steps.

Introduction

In January 2025, Fortinet disclosed a critical authentication bypass vulnerability, CVE-2024-55591, affecting its flagship products FortiOS (used in FortiGate firewalls) and FortiProxy (a web security gateway). With a CVSS score of 9.8 (CRITICAL), this flaw allows attackers to remotely gain super-admin privileges without authentication, posing a severe risk to organizations globally. This blog breaks down the technical details, exploitation mechanisms, and mitigation strategies, while suggesting visuals to enhance reader understanding.

CVE-2024-55591 is an authentication bypass flaw in the Node.js WebSocket module of FortiOS and FortiProxy. Attackers exploit it by sending crafted requests to exposed administrative interfaces, bypassing authentication checks and gaining unrestricted access to device configurations.

By understanding the nature of these vulnerabilities and proactively addressing them, organizations can enhance their security posture and protect their systems from potential malicious attacks. This blog article aims to provide valuable insights into these vulnerabilities, enabling organizations to take the necessary steps to safeguard their infrastructure.

Severity & Affected Versions

The vulnerability has been categorized as critical, with CVSS score 9.8 indicating their potential impact on affected systems.

The following versions are affected:

Exploitation Status

Fortinet has reported active exploitation of this vulnerability in the wild. Third parties have publicly disclosed proof of concept (POC) of the vulnerability, potentially increasing the risk of exploitation on vulnerable servers.

  • Impact: Remote attackers can execute CLI commands, create admin accounts, modify firewall policies, and establish SSL VPN tunnels to infiltrate internal networks510.
  • Active Exploitation: Observed in the wild since mid-November 2024, with over 48,000 devices still exposed as of January 2025.

Vulnerability Details

The vulnerability arises from an authentication bypass using an alternate path or channel (CWE-288) in the Node.js WebSocket module of FortiOS and FortiProxy. By sending specially crafted requests, attackers can bypass authentication mechanisms and obtain super-admin privileges, allowing them to execute commands, create administrative accounts, modify firewall policies, and establish SSL VPN tunnels to infiltrate internal networks.The vulnerability resides in the Node.js WebSocket module of FortiOS and FortiProxy. Attackers exploit weak validation of HTTP headers and session tokens to bypass authentication:

  1. HTTP Header Spoofing: Injecting “Forwarded: for="127.0.0.1"” tricks the system into treating requests as originating locally.
  2. Token Manipulation: The “_getAdminSession” function fails to validate the “local_access_token”, allowing attackers to forge admin sessions.

Exploitation Workflow

  1. Crafted WebSocket Request: Attackers send malicious requests to /api/v2/websocket/.
  2. Session Hijacking: Spoofed headers and tokens grant super-admin privileges.
  3. Post-Exploitation: Creation of backdoor accounts, VPN tunnels, or firewall rule modifications.

Identifying Signs of Exploitation

Key Log Indicators

  • FortiOS Log Entries:
    • logdesc="Admin login successful" with ui="jsconsole".
    • Unauthorized CLI commands (e.g., execute ssh keypair or config system admin).
  • Suspicious User Accounts: Randomly generated admin usernames (e.g., “Ed8x4k”, “Pvnw81”).

Network Indicators

  • HTTP POST requests to “/api/v2/websocket/” with malformed “Forwarded” headers.
  • Connections from known malicious IPs (e.g., 45.55.158[.]47, 87.249.138[.]47).

LetsDefend Simulated SOC Alerts

On the LetsDefend platform, you can practice by analyzing the latest zero-days in a realistic SOC environment. You can investigate and learn how attackers exploit vulnerabilities to gain unauthorized access and execute malicious code.

Mitigations And Recommendations

To protect against CVE-2024-55591, organizations should take the following steps:

Advanced Detection

  • Sigma Rules: Detect anomalies in WebSocket traffic (e.g., POST /api/v2/websocket/).
  • Hunting Queries: Search logs for randomized admin usernames or CLI command executions.

Conclusion

CVE-2024-55591 poses a severe risk to organizations using unpatched FortiOS and FortiProxy devices. With attackers actively exploiting this flaw to establish persistence and exfiltrate data, immediate patching is critical. Organizations should:

  • Prioritize upgrading affected systems.
  • Enforce strict access controls for management interfaces.
  • Continuously monitor logs for Indicators of Compromise (IoCs).

By adopting these measures, businesses can mitigate the threat and safeguard their networks from future attacks.

Indicator Of Compromise (IOC)

Public shared IOCs can be found on Fortinet advisory FG-IR-24-535

Organizations should monitor their systems for any signs of these IoCs and take appropriate action if detected.References

Share
letsdefend description card
letsdefend description card

You might also be interested in ...

Start learning cybersecurity today