CVE-2024-55591

Known Exploited Vulnerability Entry External Catalog

Entry Details

CVE-2024-55591

Confirmed

Yes

2025-02-13 00:00 UTC


Timestamps

2025-02-13

2025-02-13


Scope

Affected: Fortinet / FortiOS/FortiProxy | Description: authentication bypass using an alternate path or channel vulnerability | Exploitation type: ransomware | CWEs: CWE-288 | Origin source: cnw


References
  • {'id': 'CVE-2024-55591', 'url': 'https://www.cve.org/CVERecord?id=CVE-2024-55591'}
  • {'id': 'EUVD-2024-52819', 'url': 'https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-52819'}

b3854230-7a18-4ebf-8495-19cc1b3dfa22

cce329bf-df49-4c6e-a027-80be2e6483bd

2026-02-02 12:25 UTC

2026-02-02 12:25 UTC

Evidence (1)
Type Source Signal Confidence Details GCVE Metadata
csirt_report enisa-cnw-kev confirmed_compromise 0.75
View details
{
  "catalog": "ENISA / EU CSIRTs Network (CNW) KEV CSV",
  "cwes": "CWE-288",
  "dateReported": "13/02/25",
  "euvd": "EUVD-2024-52819",
  "exploitationType": "ransomware",
  "notes": "-",
  "originSource": "cnw",
  "product": "FortiOS/FortiProxy",
  "threatActorsExploiting": "-",
  "vendorProject": "Fortinet",
  "vulnerabilityName": "-"
}
-