Fortinet Firewall Fiasco: Zero-Day Vulnerability Sparks Security Panic
FortiOS and FortiProxy have sprung a new zero-day vulnerability (CVE-2024-55591), letting attackers hijack Fortinet firewalls like they’re swiping left on bad dates. It’s so easy, even a remote attacker can gain super-admin powers. Fortinet advises: Just say no to public management access. Your firewall will thank you.

Hot Take:
In the latest episode of “When Firewalls Go Rogue,” Fortinet is under siege by hackers who seem to have found the cheat code for unlimited access. It’s like a bad case of deja vu, with Fortinet firewalls resembling Swiss cheese more than Fort Knox. Who knew a zero-day could cause such an identity crisis?
Key Points:
- Zero-day vulnerability CVE-2024-55591 affects FortiOS and FortiProxy, allowing remote attackers to gain super-admin privileges.
- Attackers are adding rogue admin accounts and modifying firewall settings to breach networks.
- Arctic Wolf reported the attack campaign and identified four distinct phases of exploitation.
- Fortinet advises disabling the HTTP/HTTPS admin interface as a workaround.
- Security patches have been released for another vulnerability, CVE-2023-37936.
Already a member? Log in here