Wednesday, March 19, 2025
HomeCVE/vulnerabilityCISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a severe vulnerability in Fortinet’s FortiOS and FortiProxy systems.

Specifically, CVE-2025-24472, an authentication bypass vulnerability, poses a significant threat as it allows remote attackers to gain super-admin privileges through carefully crafted CSF proxy requests.

This exploit is classified under Common Weakness Enumeration (CWE) 288, which involves improper authentication.

CISA Issues Security Warning

The CVE-2025-24472 vulnerability has been identified as a high-risk threat due to its potential for misuse, especially in ransomware campaigns.

CISA’s advisory emphasizes the urgent need for users to apply mitigations as instructed by Fortinet to prevent exploitation.

Users must also follow applicable BOD 22-01 guidance for cloud services to enhance security measures.

This vulnerability can be exploited remotely without user interaction, making it particularly dangerous.

The ability to bypass authentication and gain super-admin access could allow malicious actors to execute commands, steal sensitive information, or disrupt operations entirely.

Given its association with active ransomware campaigns, the risk of financial and reputational damage to affected organizations is substantial.

Recommended Actions

To mitigate this vulnerability, organizations are advised to take immediate action:

  1. Apply Vendor Mitigations: Users should implement patches or workarounds recommended by Fortinet to secure affected systems.
  2. Follow BOD 22-01 Guidance: Organizations using cloud services should adhere to the Binding Operational Directive 22-01 guidelines to ensure robust security controls.
  3. Discontinue Use if Necessary: If mitigations are not available, CISA suggests discontinuing the use of the vulnerable product to prevent exploitation.

The due date for taking these actions is April 8, 2025. Organizations should treat this timeline as a deadline to prevent exposure to potential threats.

The CVE-2025-24472 vulnerability in Fortinet’s FortiOS and FortiProxy highlights the ongoing challenge of maintaining robust security in network systems.

As cybersecurity threats evolve, prompt action and adherence to guidance from authoritative bodies like CISA remain crucial in protecting against sophisticated attacks.

Organizations must proactively address these vulnerabilities to safeguard their digital assets and maintain operational integrity.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace...

11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

Cybersecurity researchers have discovered that multiple state-sponsored threat actors have been exploiting an eight-year-old...

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware....

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A critical vulnerability affecting Synology's DiskStation Manager (DSM) has been disclosed, allowing remote attackers...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace...

11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

Cybersecurity researchers have discovered that multiple state-sponsored threat actors have been exploiting an eight-year-old...

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware....