Fortinet Security Updates – 15 January 2025

Fortinet has released security updates to fix several vulnerabilities across multiple Fortinet products.

The addressed vulnerabilities could allow the attacker to gain elevated privileges, obtain sensitive information, perform denial of services attacks, manipulate files, conduct SQL injection attacks, bypass security restrictions, perform cross-site scripting attacks, or execute arbitrary code and gain access to the affected systems.

Sample of the addressed vulnerabilities:

1. FG-IR-24-535 Authentication Bypass in Node.js WebSocket Module Vulnerability (CVE-2024-55591):

  • CVSS: 9.6
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Gain Privileges

2. FG-IR-23-260 Hardcoded Session Secret Leading to Unauthenticated Remote Code Execution Vulnerability (CVE-2023-37936):

  • CVSS: 9.6
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Gain Access

Sample of the affected products:

  • FortiManager.
  • FortiAnalyzer.
  • FortiOS.
  • FortiProxy.
  • FortiSIEM.

It should be highlighted that Fortinet is aware that the zero-day vulnerability “CVE-2024-55591” is being exploited in the wild.

Vulnerabilities
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Fortinet Security Advisory

References