diff --git a/docs/advisories/20250115005-Known-Exploited-Fortinet-FortiOS-Vulnerabilities.md b/docs/advisories/20250115005-Known-Exploited-Fortinet-FortiOS-Vulnerabilities.md index 10368ed9..25a75424 100644 --- a/docs/advisories/20250115005-Known-Exploited-Fortinet-FortiOS-Vulnerabilities.md +++ b/docs/advisories/20250115005-Known-Exploited-Fortinet-FortiOS-Vulnerabilities.md @@ -4,14 +4,12 @@ Fortinet has identified an Authentication Bypass vulnerability using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy, which may allow remote attackers to gain super-admin privileges via crafted requests to Node.js websocket module. - ## What is vulnerable? -| Product(s) Affected | Version(s) | CVE | CVSS | Severity | -| ------------------- | ----------------------- | ----------------------------------------------------------------- | ------------ | -------------- | -| FortiOS 7.0 | 7.0.0 through 7.0.16 | [CVE-2024-55591](https://nvd.nist.gov/vuln/detail/CVE-2024-55591) | 9.6 | **Critical** | -| FortiProxy 7.0
FortiProxy 7.2 | 7.0.0 through 7.0.19
7.2.0 through 7.2.12 | [CVE-2024-55591](https://nvd.nist.gov/vuln/detail/CVE-2024-55591) | 9.6 | **Critical** | - +| Product(s) Affected | Version(s) | CVE | CVSS | Severity | +| -------------------------------- | -------------------------------------------- | ----------------------------------------------------------------- | ---- | ------------ | +| FortiOS 7.0 | 7.0.0 through 7.0.16 | [CVE-2024-55591](https://nvd.nist.gov/vuln/detail/CVE-2024-55591) | 9.6 | **Critical** | +| FortiProxy 7.0
FortiProxy 7.2 | 7.0.0 through 7.0.19
7.2.0 through 7.2.12 | [CVE-2024-55591](https://nvd.nist.gov/vuln/detail/CVE-2024-55591) | 9.6 | **Critical** | ## Recommendation @@ -22,4 +20,4 @@ The WA SOC recommends administrators apply the solutions as per vendor instructi ## Additional References - Tenable: -- ACSC: \ No newline at end of file +- ACSC: