overview
CVE-2025-24472 is a high-severity authentication bypass vulnerability affecting Fortinet's FortiOS and FortiProxy products. This flaw allows remote attackers to gain super-admin privileges by sending specially crafted Cooperative Security Fabric (CSF) proxy requests. The affected versions are:
Fortinet addressed this vulnerability in January 2024 with the release of the following updates:
Last month, Arctic Wolf confirmed that this vulnerability was under active exploitation and directly observed one campaign that made extensive use of CVE-2025-24472.
It's important to note that if you have already applied these updates to mitigate CVE-2024-55591, your systems are also protected against CVE-2025-24472. As of now, there are no reports of this vulnerability being actively exploited in the wild.
For users unable to apply the patches immediately, Fortinet recommends disabling the HTTP/HTTPS administrative interface or restricting access to trusted IP addresses as temporary mitigation measures.
IOCs ADDED TO OUR THREAT FEEDS
NOTE!: Avertium is actively searching across all monitored environments for the IoC’s listed below. If any are discovered, we will reach out to you directly. If your environment or portions of your environment are not currently being monitored, please reach out to your Service Delivery Manager.
Type |
Indicator |
Log Entry - Admin Login |
type="event" subtype="system" level="information" vd="root" logdesc="Admin login successful" sn="1733486785" user="admin" ui="jsconsole" method="jsconsole" srcip=1.1.1.1 dstip=1.1.1.1 action="login" status="success" reason="none" profile="super_admin" msg="Administrator admin logged in successfully from jsconsole" |
Log Entry - Admin Account Creation |
type="event" subtype="system" level="information" vd="root" logdesc="Object attribute configured" user="admin" ui="jsconsole(127.0.0.1)" action="Add" cfgtid=1411317760 cfgpath="system.admin" cfgobj="vOcep" cfgattr="password[*]accprofile[super_admin]vdom[root]" msg="Add system.admin vOcep" |
IP Address - Observed Source |
45.55.158.47 |
IP Address - Observed Source |
87.249.138.47 |
IP Address - Observed Source |
155.133.4.175 |
IP Address - Observed Source |
37.19.196.65 |
IP Address - Observed Source |
149.22.94.37 |
Username - Randomly Generated |
Gujhmk |
Username - Randomly Generated |
Ed8x4k |
Username - Randomly Generated |
G0xgey |
Username - Randomly Generated |
Pvnw81 |
Username - Randomly Generated |
Alg7c4 |
Username - Randomly Generated |
Ypda8a |
Username - Randomly Generated |
Kmi8p4 |
Username - Randomly Generated |
1a2n6t |
Username - Randomly Generated |
8ah1t6 |
Username - Randomly Generated |
M4ix9f |
TTPs TO MONITOR
🔹 Initial Access
🔹 Persistence
🔹 Defense Evasion
additional recommendations + information
Apply Patches Immediately
Fortinet has released patches to address this authentication bypass vulnerability. Upgrade to the following versions to mitigate the risk:
If you have already applied patches for CVE-2024-55591, your system is also protected against CVE-2025-24472.
If you cannot apply patches right away, consider the following temporary mitigations:
Restrict Administrative Interface Access
SUPPORTING DOCUMENTATION