
13 January 2025
Fortinet amended their advisory for FG-IR-24-535 or CVE-2024-55591, an authentication bypass vulnerability, by including another vulnerability tracked as CVE-2025-24472. The original vulnerability was announced as a 0-day vulnerability and has proof-of-concept exploit code available.
The same attack path reported in the former vulnerability was discovered in the Fortinet Cooperative Security Fabric (CSF). CSF is a proprietary protocol used by Fortinet devices to exchange data and coordinate responses to suspicious behavior.
NOTE: If you already applied the updates for CVE-2024-55591, then CVE-2025-24472 is also fixed.
Fortinet products and versions impacted by CVE-2025-24472 are:
This blog is a follow up on our initial blog published in January 2025 that detailed CVE-2024-55591.
It is advised to upgrade as soon as possible to:
We advise organizations to immediately disable public access to firewall management interfaces, by limiting the IP addresses that can reach the HTTP/HTTPS administration interface via a local policy to restrict access only to a predefined group on the management interface (e.g., port1).
It is also advised to hunt for suspicious new or updated accounts from mid-November, and check if your devices have any open ports for unknown reasons (particularly 4433, 59449, and 59450).
A IPS rule may have been provided by the vendor but needs to be manually configured.
The Orange Cyberdefense CERT tracks developments regarding this vulnerability and publishes World Watch advisories updates as new relevant information on this matter becomes available. World Watch subscribers can find more details on this topic here. More information on how to subscribe to this service can be found here.
Orange Cyberdefense’s Datalake platform provides access to Indicators of Compromise (IoCs) related to this threat, which are automatically fed into our Managed Threat Detection services. This enables proactive hunting for IoCs if you subscribe to our Managed Threat Detection service that includes Threat Hunting. If you would like us to prioritize addressing these IoCs in your next hunt, please make a request through your MTD customer portal or contact your representative.
Orange Cyberdefense’s MTI [protect] service offers the ability to automatically feed network-related IoCs into your security solutions. To learn more about this service and to find out which firewall, proxy, and other vendor solutions are supported, please get in touch with your Orange Cyberdefense Trusted Solutions representative.
Please feel free to contact Orange Cyberdefense CERT if you suspect any potential compromise or if you require remediation expertise regarding this matter.
Please review our initial blog published in January 2025 that detailed CVE-2024-55591 as it describes the relevant information that is also applicable to CVE-2025-24472.
The latest Security Navigator 2025 from Orange Cyberdefense underscores the growing risks associated with unpatched vulnerabilities, highlighting the need for organizations to adopt a proactive approach to vulnerability management.
Orange Cyberdefense reviewed over 32,000 distinct CVEs in client’s environments, noting that patching delays create substantial risks for exploitation. VPNs and similar technologies are particularly at risk, as they often become prime targets for attackers due to their exposure and critical role in securing organizational networks.
To address these risks, Orange Cyberdefense advocates for adopting a threat-informed approach, including: