An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiOS version 7.6.0, version 7.4.7 and below, 7.0 all versions, 6.4 all versions and FortiProxy version 7.6.1 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions may allow a remote unauthenticated user to bypass the DNS filter via Apple devices.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-053 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Jul 2025, 16:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortisase:24.4.32:*:*:*:-:*:*:* cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-053 - Vendor Advisory | |
First Time |
Fortinet fortiproxy
Fortinet fortios Fortinet Fortinet fortisase |
08 Jul 2025, 16:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-08 15:15
Updated : 2025-07-22 16:22
NVD link : CVE-2024-55599
Mitre link : CVE-2024-55599
CVE.ORG link : CVE-2024-55599
JSON object : View
Products Affected
fortinet
- fortios
- fortisase
- fortiproxy
CWE
CWE-358
Improperly Implemented Security Check for Standard