diff --git a/docs/advisories/20250115005-Known-Exploited-Fortinet-FortiOS-Vulnerabilities.md b/docs/advisories/20250115005-Known-Exploited-Fortinet-FortiOS-Vulnerabilities.md
index 10368ed9..25a75424 100644
--- a/docs/advisories/20250115005-Known-Exploited-Fortinet-FortiOS-Vulnerabilities.md
+++ b/docs/advisories/20250115005-Known-Exploited-Fortinet-FortiOS-Vulnerabilities.md
@@ -4,14 +4,12 @@
Fortinet has identified an Authentication Bypass vulnerability using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy, which may allow remote attackers to gain super-admin privileges via crafted requests to Node.js websocket module.
-
## What is vulnerable?
-| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
-| ------------------- | ----------------------- | ----------------------------------------------------------------- | ------------ | -------------- |
-| FortiOS 7.0 | 7.0.0 through 7.0.16 | [CVE-2024-55591](https://nvd.nist.gov/vuln/detail/CVE-2024-55591) | 9.6 | **Critical** |
-| FortiProxy 7.0
FortiProxy 7.2 | 7.0.0 through 7.0.19
7.2.0 through 7.2.12 | [CVE-2024-55591](https://nvd.nist.gov/vuln/detail/CVE-2024-55591) | 9.6 | **Critical** |
-
+| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
+| -------------------------------- | -------------------------------------------- | ----------------------------------------------------------------- | ---- | ------------ |
+| FortiOS 7.0 | 7.0.0 through 7.0.16 | [CVE-2024-55591](https://nvd.nist.gov/vuln/detail/CVE-2024-55591) | 9.6 | **Critical** |
+| FortiProxy 7.0
FortiProxy 7.2 | 7.0.0 through 7.0.19
7.2.0 through 7.2.12 | [CVE-2024-55591](https://nvd.nist.gov/vuln/detail/CVE-2024-55591) | 9.6 | **Critical** |
## Recommendation
@@ -22,4 +20,4 @@ The WA SOC recommends administrators apply the solutions as per vendor instructi
## Additional References
- Tenable:
-- ACSC:
\ No newline at end of file
+- ACSC: