CISA has issued a critical alert about a critical vulnerability in Fortinet’s FortiOS and FortiProxy systems. CVE-2025-24472, an authentication bypass vulnerability, has been added to CISA’s Known Exploited Vulnerabilities catalog.
Fortinet FortiOS Authentication Bypass Vulnerability:
By infosecbulletin
/ Wednesday , March 19 2025
CISA has issued a critical alert about a critical vulnerability in Fortinet’s FortiOS and FortiProxy systems. CVE-2025-24472, an authentication bypass...
Read More
By infosecbulletin
/ Wednesday , March 19 2025
11 nation-state groups from North Korea, China, and Russia are exploiting a vulnerability in a common feature of Microsoft Windows....
Read More
By infosecbulletin
/ Tuesday , March 18 2025
Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. Veriti’s latest research...
Read More
By infosecbulletin
/ Tuesday , March 18 2025
A critical vulnerability, CVE-2024-540385, has been found in HPE Cray XD670 servers using the AMI BMC Redfish API, allowing remote...
Read More
By infosecbulletin
/ Tuesday , March 18 2025
CVE-2025-24813, a critical remote code execution vulnerability, is actively exploited, enabling attackers to control vulnerable Apache Tomcat servers with a...
Read More
By infosecbulletin
/ Monday , March 17 2025
MIST Cyber Security Club hosted an exciting MIST CyberTron 2025, featuring a CTF competition, hacking sessions, live demonstrations, and real-world...
Read More
By infosecbulletin
/ Monday , March 17 2025
Cybersecurity researchers unveil a critical remote code execution vulnerability (CVE-2025-24016) in Wazuh, a popular open-source SIEM platform. The vulnerability has...
Read More
By infosecbulletin
/ Monday , March 17 2025
A recent report from Elastic reveals that threat actors misuse Amazon Web Services (AWS) Simple Notification Service (SNS) for malicious...
Read More
By infosecbulletin
/ Saturday , March 15 2025
Cybersecurity researcher Jeremiah Fowler found and reported a non-password-protected database with over 86,000 records belonging to ESHYFT, a New Jersey-based...
Read More
By infosecbulletin
/ Friday , March 14 2025
Forescout Research- Vedere Labs identified a series of intrusion based on two Fortinet vulnerabilities which began with the exploitation of...
Read More
Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that allows a remote attacker to gain super-admin privileges via crafted CSF proxy requests, which carries a CVSS score of 8.1.
The vulnerability affects FortiOS versions 7.0.0 to 7.0.16, FortiProxy 7.0.0 to 7.0.19, and FortiProxy 7.2.0 to 7.2.12.

Security experts caution that exploitation could give attackers full administrative access to systems, allowing them to create fake admin accounts, alter firewall policies, and reach SSL VPNs to access internal networks.
Mitigations:
CISA is directing organizations to “apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable”.
Fortinet has issued patches for vulnerabilities in FortiOS 7.0.17 and higher, as well as FortiProxy 7.0.20/7.2.13 and above.
The KEV catalog, managed by CISA, is a reliable source of known vulnerabilities actively exploited. CISA urges all organizations to prioritize fixing these Organizations should use the KEV catalog to prioritize their vulnerability management, as it is vital for effective external attack surface management and reducing compromise risks.
11 state hackers exploit new Windows zero-day since 2017