{"uuid": "7d10ff00-e111-4448-932e-a5ab292bdf26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55591", "type": "exploited", "source": "https://t.me/cibsecurity/82182", "content": "\ud83e\udd85 Fortinet Zero-Day CVE-2024-55591 Exposed: Super-Admin Access Risk \ud83e\udd85\n\n  Overview     Fortinet, a global leader in cybersecurity solutions, recently released a critical advisory addressing a significant vulnerability CVE202455591 in its FortiOS and FortiProxy products. This flaw, which has a CVSSv3 score of 9.6, is categorized as a critical authentication bypass vulnerability and is currently being exploited in the wild.   Attackers leveraging this vulnerability can potentially gain superadmin privileges by exploiting weaknesses in the Node.js WebSocket module, making this a highstakes issue for organizations relying on Fortinet's products.   This blog provides a detailed overview of the vulnerability, affected versions, Indicators of Compromise IOCs, mitigation strategies, and steps for administrators to protect their systems effectively.   The Vulnerabil...\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"CYBLE\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-01-20T20:46:34.000000Z"}