CVE-2024-55599

An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiOS version 7.6.0, version 7.4.7 and below, 7.0 all versions, 6.4 all versions and FortiProxy version 7.6.1 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions may allow a remote unauthenticated user to bypass the DNS filter via Apple devices.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisase:24.4.32:*:*:*:-:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*

History

22 Jul 2025, 16:22

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:fortisase:24.4.32:*:*:*:-:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
References () https://fortiguard.fortinet.com/psirt/FG-IR-24-053 - () https://fortiguard.fortinet.com/psirt/FG-IR-24-053 - Vendor Advisory
First Time Fortinet fortiproxy
Fortinet fortios
Fortinet
Fortinet fortisase

08 Jul 2025, 16:18

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-08 15:15

Updated : 2025-07-22 16:22


NVD link : CVE-2024-55599

Mitre link : CVE-2024-55599

CVE.ORG link : CVE-2024-55599


JSON object : View

Products Affected

fortinet

  • fortios
  • fortisase
  • fortiproxy
CWE
CWE-358

Improperly Implemented Security Check for Standard