Emergency Security Bulletin: FortiOS and FortiProxy Authentication Bypass Vulnerability

https://www.redlegg.com/hubfs/Theme-2024/overlay-red.png featured image

By: RedLegg's Cyber Threat Intelligence Team

About:

RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.


VULNERABILITIES

Authentication Bypass Vulnerability in FortiOS and FortiProxy

CVSS Score: 8.1 (High)
Identifier: CVE-2025-24472
Exploit or POC: Yes, there is an exploitation of the vulnerability.
Update: CVE-2025-24472 – Fortinet Security Advisory

Description: CVE-2025-24472 is an Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy. This flaw may allow a remote attacker to gain super-admin privileges via crafted requests to the Node.js websocket module or via crafted CSF proxy requests. Successful exploitation could lead to full administrative control over affected systems, posing a severe risk to confidentiality, integrity, and availability.

Mitigation Recommendation: Patching is currently the only method of mitigation. Affected versions include FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19. Users should update to the latest software versions as listed in the Fortinet Security Advisory. Immediate patching is strongly recommended to protect systems from potential exploitation.