Original Article Text

Click to Toggle View

Fortinet discloses second firewall auth bypass patched in January. Fortinet warned today that attackers are exploiting another now-patched zero-day bug in FortiOS and FortiProxy to hijack Fortinet firewalls and breach enterprise networks. Successful exploitation of this authentication bypass vulnerability (CVE-2025-24472) allows remote attackers to gain super-admin privileges by making maliciously crafted CSF proxy requests.  The security flaw impacts FortiOS 7.0.0 through 7.0.16, FortiProxy 7.0.0 through 7.0.19, and FortiProxy 7.2.0 through 7.2.12. Fortinet fixed it in FortiOS 7.0.17 or above and FortiProxy 7.0.20/7.2.13 or above. Fortinet added the bug as a new CVE-ID to a security advisory issued last month cautioning customers that threat actors were exploiting a zero-day vulnerability in FortiOS and FortiProxy (tracked as CVE-2024-55591), which affected the same software versions. However, the now-fixed CVE-2024-55591 flaw could be exploited by sending malicious requests to the Node.js websocket module. According to Fortinet, attackers exploit the two vulnerabilities to generate random admin or local users on affected devices, adding them to new and existing SSL VPN user groups. They have also been seen modifying firewall policies and other configurations and accessing SSLVPN instances with previously established rogue accounts "to gain a tunnel to the internal network.network." While Fortinet didn't provide additional information on the campaign, cybersecurity company Arctic Wolf released a report with matching indicators of compromise (IOCs), saying vulnerable Fortinet FortiGate firewalls with Internet-exposed management interfaces have been under attack since at least mid-November. "The campaign involved unauthorized administrative logins on management interfaces of firewalls, creation of new accounts, SSL VPN authentication through those accounts, and various other configuration changes," Arctic Wolf Labs said. "While the initial access vector is not definitively confirmed, a zero-day vulnerability is highly probable. Organizations should urgently disable firewall management access on public interfaces as soon as possible." Arctic Wolf Labs also provided this timeline for CVE-2024-55591 mass-exploitation attacks, saying it includes four unique phases: "Given subtle differences in tradecraft and infrastructure between intrusions, it is possible that multiple individuals or groups may have been involved in this campaign, but jsconsole usage was a common thread across the board," it added. Arctic Wolf Labs added that it notified Fortinet about the attacks on December 12 and received confirmation from the company's Product Security Incident Response Team (PSIRT) five days later that the activity was known and already under investigation. Fortinet advised admins who can't immediately deploy the security updates to secure vulnerable firewalls to disable the HTTP/HTTPS administrative interface or limit the IP addresses that can reach it via local-in policies as a workaround. BleepingComputer reached out to a Fortinet spokesperson for comment but did not hear back by time of publication.

Daily Brief Summary

CYBERCRIME // Fortinet Discloses Second Zero-Day Exploit Targeting Firewalls

Fortinet has revealed a new authentication bypass vulnerability (CVE-2025-24472) in FortiOS and FortiProxy, leading to enterprise network breaches by granting attackers super-admin privileges.

The vulnerability affects multiple versions: FortiOS 7.0.0 to 7.0.16 and FortiProxy 7.0.0 to 7.2.12. The security patch has been issued in newer versions of these software products.

Attackers exploited this flaw and a previously disclosed vulnerability (CVE-2024-55591) to insert rogue admin users, modify firewall policies, and access SSLVPN instances for internal network entry.

The attacks, detected since at least mid-November, involve unauthorized administrative logins and modifications on exposed firewall management interfaces over the Internet.

Arctic Wolf Labs has reported observing related attacks with similar indicators of compromise, suggesting a widespread and possibly multisource hacking campaign.

Organizations are urgently advised to disable or secure management interfaces on public-facing devices to avoid unauthorized access.

Fortinet's responsiveness includes the development of patches for both vulnerabilities and advice on interim protective measures for affected systems.