cve/2024/CVE-2024-55591.md

42 lines
2.1 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-55591](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55591)
![](https://img.shields.io/static/v1?label=Product&message=FortiOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FortiProxy&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=7.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Execute%20unauthorized%20code%20or%20commands&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0x7556/CVE-2024-55591
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2025-09-29 16:08:36 +00:00
- https://github.com/AlgoSecure/2025-fortigate-leak-checker
- https://github.com/Ostorlab/KEV
- https://github.com/UMChacker/CVE-2024-55591-POC
- https://github.com/binarywarm/exp-cmd-add-admin-vpn-CVE-2024-55591
2025-09-29 21:09:30 +02:00
- https://github.com/cyb3r-w0lf/nuclei-template-collection
2025-09-29 16:08:36 +00:00
- https://github.com/exfil0/CVE-2024-55591-POC
- https://github.com/k8gege/Ladon
- https://github.com/packetinside/CISA_BOT
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/rawtips/CVE-2024-55591
- https://github.com/rxerium/stars
2025-09-29 21:09:30 +02:00
- https://github.com/souzatyler/fortios-auth-bypass-check-CVE-2024-55591
2025-09-29 16:08:36 +00:00
- https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591
- https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591
- https://github.com/tadmaddad/fortidig
2025-09-29 21:09:30 +02:00
- https://github.com/tanjiti/sec_profile
- https://github.com/ums91/CISA_BOT
2025-09-29 16:08:36 +00:00
- https://github.com/virus-or-not/CVE-2024-55591
- https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591
- https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591
- https://github.com/zulloper/cve-poc