Metrics
Affected Vendors & Products
No advisories yet.
Solution
Please upgrade to FortiOS version 7.0.17 or above Please upgrade to FortiProxy version 7.2.13 or above Please upgrade to FortiProxy version 7.0.20 or above
Workaround
No workaround given by the vendor.
Wed, 22 Oct 2025 08:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 04:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 17 Jan 2025 01:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 16 Jan 2025 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet fortiproxy
|
|
| Weaknesses | NVD-CWE-Other | |
| CPEs | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet fortiproxy
|
Wed, 15 Jan 2025 09:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Wed, 15 Jan 2025 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Jan 2025 23:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module. | |
| First Time appeared |
Fortinet
Fortinet fortios |
|
| Weaknesses | CWE-288 | |
| CPEs | cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.10:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.11:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.12:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.13:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.14:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.15:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.16:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.2:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.3:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.4:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.5:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.6:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.7:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.8:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.0.9:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortios |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-10-21T22:55:32.705Z
Reserved: 2024-12-09T11:19:49.470Z
Link: CVE-2024-55591
Updated: 2025-01-14T15:18:47.607Z
Status : Analyzed
Published: 2025-01-14T14:15:34.450
Modified: 2025-10-24T12:54:28.963
Link: CVE-2024-55591
No data.
OpenCVE Enrichment
No data.