{"uuid": "7a881107-1112-4d54-a209-79eedb65ef61", "vulnerability": {"vulnId": "CVE-2024-55591", "altId": []}, "gcve": {"origin_uuid": "cce329bf-df49-4c6e-a027-80be2e6483bd", "object_uuid": "7a881107-1112-4d54-a209-79eedb65ef61"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2025-02-13T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2025-02-13T00:00:00Z", "recorded_at": "2026-02-02T13:23:54Z", "first_seen_at": "2025-02-13T00:00:00Z"}, "scope": {"notes": "Affected: Fortinet / FortiOS/FortiProxy | Description: authentication bypass using an alternate path or channel vulnerability | Exploitation type: ransomware | CWEs: CWE-288 | Origin source: cnw"}, "evidence": [{"type": "csirt_report", "source": "enisa-cnw-kev", "signal": "confirmed_compromise", "confidence": 0.75, "details": {"cwes": "CWE-288", "euvd": "EUVD-2024-52819", "notes": "-", "catalog": "ENISA / EU CSIRTs Network (CNW) KEV CSV", "product": "FortiOS/FortiProxy", "dateReported": "13/02/25", "originSource": "cnw", "vendorProject": "Fortinet", "exploitationType": "ransomware", "vulnerabilityName": "-", "threatActorsExploiting": "-"}}], "references": [{"id": "CVE-2024-55591", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55591"}, {"id": "EUVD-2024-52819", "url": "https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-52819"}]}
