Fortinet’s Zero-Day Dilemma: Critical Vulnerabilities Leave Cyber Defenders on Edge
Fortinet has discovered critical vulnerabilities, including a zero-day flaw in FortiOS and FortiProxy, allowing remote super-admin exploits. Patches are now available, and cybersecurity firm Arctic Wolf previously flagged potential zero-day activity. Organizations should prioritize patching to avoid being the punchline in cybercriminals’ latest joke.

Hot Take:
Looks like Fortinet’s products are having a vulnerability party, and everyone (especially hackers) is invited! With exploits so hot, they might as well be the new internet trend. It’s like a cybersecurity version of “Whac-A-Mole,” except the moles are zero-days, and the mallet is a patch that’s fashionably late to the party. Who knew node.js websockets could be so treacherous? Buckle up, IT teams, it’s patching season!
Key Points:
- Fortinet disclosed critical vulnerabilities, including a zero-day flaw actively exploited in the wild.
- The zero-day, CVE-2024-55591, affects FortiOS and FortiProxy, granting remote attackers super-admin privileges.
- Patches are available in FortiOS 7.0.17, FortiProxy 7.2.13, and FortiProxy 7.0.20.
- Cybersecurity firm Arctic Wolf detected the zero-day in a campaign targeting exposed Fortinet firewalls.
- Other vulnerabilities patched address issues like code execution, DoS, and brute force attacks.