Fortinet Fiasco: Zero-Day Exploit Opens Doors to Super Admin Havoc!
Fortinet has patched a zero-day flaw in its FortiOS and FortiProxy products, preventing attackers from gaining super-admin access to devices. This vulnerability allowed hackers to create new accounts and tamper with settings. Users are advised to update immediately, as threat actors were already exploiting this critical vulnerability.

Hot Take:
Fortinet’s zero-day flaw is like finding out your house keys open the front door to a secret villain’s lair. Who knew your trusty FortiOS was moonlighting as an all-access pass for cybercriminals? Time to lock those doors and change the locks, folks!
Key Points:
- Fortinet patched a critical zero-day authentication bypass flaw, CVE-2024-55591, affecting FortiOS and FortiProxy products.
- The vulnerability allows attackers to gain super-admin privileges via crafted requests to Node.js websocket module.
- Exploited activities include creating unauthorized admin accounts, altering firewall settings, and accessing internal networks.
- Fortinet recommended users update affected products and provided workarounds to mitigate the flaw.
- The flaw involves a chain of issues, including exploiting a race condition and using a special parameter to bypass authentication.
Already a member? Log in here