Skip to content

Fortinet Warns of Actively Exploited Zero-Day in FortiGate Firewalls

Fortinet's urgent warning: Actively exploited zero-day in FortiGate firewalls puts your security at risk. Upgrade now to protect your systems.

In this picture we can see a fort and people.
In this picture we can see a fort and people.

Fortinet Warns of Actively Exploited Zero-Day in FortiGate Firewalls

Fortinet has revealed a critical zero-day vulnerability, CVE-2024-55591, in some of its FortiGate firewalls. Disclosed on January 14, 2025, this vulnerability is actively exploited in the wild and has a CVSS score of 9.6, indicating severe impact.

Arctic Wolf observed a massive exploitation campaign affecting FortiGate devices since December 2024. The campaign involved threat actors altering firewall configurations and extracting credentials using DCSync. Fortinet confirmed this active exploitation.

The vulnerability allows an authentication bypass and affects FortiOS versions 7.0.0 through 7.0.16 and FortiProxy versions 7.0.0 through 7.0.19 and versions 7.2.0 through 7.2.12. To mitigate, users should upgrade their software and apply a workaround involving local-in policies and address groups. Fortinet also recommends limiting IP addresses that can reach the administrative interface.

Fortinet's disclosure of CVE-2024-55591 highlights the urgent need for users to upgrade their FortiOS and FortiProxy software and apply the recommended workarounds. By doing so, they can protect their systems from active exploitation and potential data breaches.

Read also:

Latest