CVE-2024-55599

An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiOS version 7.6.0, version 7.4.7 and below, 7.0 all versions, 6.4 all versions and FortiProxy version 7.6.1 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions may allow a remote unauthenticated user to bypass the DNS filter via Apple devices.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisase:24.4.32:*:*:*:-:*:*:*

History

22 Jul 2025, 16:22

Type Values Removed Values Added
First Time Fortinet fortisase
Fortinet
Fortinet fortios
Fortinet fortiproxy
CPE cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisase:24.4.32:*:*:*:-:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*
References () https://fortiguard.fortinet.com/psirt/FG-IR-24-053 - () https://fortiguard.fortinet.com/psirt/FG-IR-24-053 - Vendor Advisory

08 Jul 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-08 15:15

Updated : 2025-07-22 16:22


NVD link : CVE-2024-55599

Mitre link : CVE-2024-55599


JSON object : View

Products Affected

fortinet

  • fortiproxy
  • fortisase
  • fortios
CWE
CWE-358

Improperly Implemented Security Check for Standard