Created on 2025-02-12 05:38 and updated on 2025-02-12 05:38.

Description

PSIRT | FortiGuard Labs

Summary

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module or via crafted CSF proxy requests.

Please note that reports show this is being exploited in the wild.

Version

Affected

Solution

FortiOS 7.6

Not affected

Not Applicable

FortiOS 7.4

Not affected

Not Applicable

FortiOS 7.2

Not affected

Not Applicable

FortiOS 7.0

7.0.0 through 7.0.16

Upgrade to 7.0.17 or above

FortiOS 6.4

Not affected

Not Applicable

FortiProxy 7.6

Not affected

Not Applicable

FortiProxy 7.4

Not affected

Not Applicable

FortiProxy 7.2

7.2.0 through 7.2.12

Upgrade to 7.2.13 or above

FortiProxy 7.0

7.0.0 through 7.0.19

Upgrade to 7.0.20 or above

FortiProxy 2.0

Not affected

Not Applicable

Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

IoCs

The following log entries are possible IOC's:

  • Following login activity log with random scrip and dstip:
    type="event" subtype="system" level="information" vd="root" logdesc="Admin login successful" sn="1733486785" user="admin" ui="jsconsole" method="jsconsole" srcip=1.1.1.1 dstip=1.1.1.1 action="login" status="success" reason="none" profile="super_admin" msg="Administrator admin logged in successfully from jsconsole"

  • Following admin creation log with seemingly randomly generated user name and source IP:
    type="event" subtype="system" level="information" vd="root" logdesc="Object attribute configured" user="admin" ui="jsconsole(127.0.0.1)" action="Add" cfgtid=1411317760 cfgpath="system.admin" cfgobj="vOcep" cfgattr="password[*]accprofile[super_admin]vdom[root]" msg="Add system.admin vOcep"

  • The following IP addresses were mostly found used by attackers in above logs:
    1.1.1.1
    127.0.0.1
    2.2.2.2
    8.8.8.8
    8.8.4.4

Please note that the above IP parameters are not the actual source IP addresses of the attack traffic, they are generated arbitrarily by the attacker as a parameter. Because of this they should not be used for any blocking.

Please note as well that sn and cfgtid are not relevant to the attack.

The operations performed by the Threat Actor (TA) in the cases we observed were part or all of the below:
- Creating an admin account on the device with random user name
- Creating a Local user account on the device with random user name
- Creating a user group or adding the above local user to an existing sslvpn user group
- Adding/changing other settings (firewall policy, firewall address, ...)
- Logging in the sslvpn with the above added local users to get a tunnel to the internal network.

Admin or Local user created by the TA is randomly generated. e.g:
Gujhmk
Ed8x4k
G0xgey
Pvnw81
Alg7c4
Ypda8a
Kmi8p4
1a2n6t
8ah1t6
M4ix9f
...etc...

Additionally, the TA has been seen using the following IP addresses:

45.55.158.47 [most used IP address]
87.249.138.47
155.133.4.175
37.19.196.65
149.22.94.37

Workaround

Disable HTTP/HTTPS administrative interface

OR

Limit IP addresses that can reach the administrative interface via local-in policies:

config firewall address
edit "my_allowed_addresses"
set subnet
end

Then create an Address Group:

config firewall addrgrp
edit "MGMT_IPs"
set member "my_allowed_addresses"
end

Create the Local in Policy to restrict access only to the predefined group on management interface (here: port1):

config firewall local-in-policy
edit 1
set intf port1
set srcaddr "MGMT_IPs"
set dstaddr "all"
set action accept
set service HTTPS HTTP
set schedule "always"
set status enable
next

edit 2
set intf "any"
set srcaddr "all"
set dstaddr "all"
set action deny
set service HTTPS HTTP
set schedule "always"
set status enable
end

If using non default ports, create appropriate service object for GUI administrative access:

config firewall service custom
edit GUI_HTTPS
set tcp-portrange 443
next

edit GUI_HTTP
set tcp-portrange 80
end

Use these objects instead of "HTTPS HTTP "in the local-in policy 1 and 2 below.

Please note that the trusthost feature achieves the same as the local-in policies above only if all GUI users are configured with it. Therefore, the local-in policies above are the preferred workaround.

Please note as well that an attacker needs to know an admin account's username to perform the attack and log in the CLI. Therefore, having a non-standard and non-guessable username for admin accounts does offer some protection, and is, in general, a best practice. Keep in mind however that the targeted websocket not being an authentication point, nothing would prevent an attacker from bruteforcing the username.

Please contact customer support for assistance.

CSF requests issue:

Disable Security Fabric from the CLI:

Config system csf
   Set status disable
end

Acknowledgement

Fortinet is pleased to thank Sonny of watchTowr (https://watchtowr.com/)) for reporting the CSF related vulnerability under responsible disclosure.

Timeline

2025-01-14: Format
2025-01-15: Added non-standard admin account username best practice
2025-01-15: Clarified that IP addresses "under attacker control" means they are arbitrarily generated by the attacker
2025-01-21: Added IPS package info
2025-01-24: Removed IPS package info
2025-02-11: Added CVE-2025-24472 and its acknowledgement

CVE-2024-55591 and CVE-2025-24472

Vulnerabilities included in this bundle

Author

Alexandre Dulaunoy

Combined sightings

Author Vulnerability Source Type Date
automationCVE-2025-24472https://poliverso.org/objects/0477a01e-e346f472-8ff15963a9f2210dseen1 day ago
automationCVE-2025-24472https://poliverso.org/objects/0477a01e-e346f472-8ff15963a9f2210dseen1 day ago
automationCVE-2025-24472https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3llmxtudicur2seen1 day ago
automationCVE-2025-24472MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen7 days ago
automationCVE-2025-24472https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4zb4aiv7o2seen8 days ago
automationCVE-2025-24472https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4pcuhbhvg2seen8 days ago
automationCVE-2025-24472https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ll4m2ndecwo2seen8 days ago
automationCVE-2025-24472https://bsky.app/profile/redteamnews.bsky.social/post/3ll3o7aocl22yseen8 days ago
automationCVE-2025-24472https://bsky.app/profile/redteamnews.bsky.social/post/3ll3dx7xtzq2rseen8 days ago
automationCVE-2025-24472https://bsky.app/profile/helma.mastodon.social.ap.brid.gy/post/3lkxbkpcfwfe2seen10 days ago
automationCVE-2025-24472https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lktd6pypgx42seen12 days ago
automationCVE-2025-24472https://threatintel.cc/2025/03/20/incident-nightspire-ransomware-attack-on.htmlseen12 days ago
automationCVE-2025-24472https://bsky.app/profile/getpokemon7.bsky.social/post/3lkrkzjd2b223seen12 days ago
automationCVE-2025-24472https://bsky.app/profile/getpokemon7.bsky.social/post/3lkrbwinv7s23seen12 days ago
automationCVE-2025-24472https://bsky.app/profile/beikokucyber.bsky.social/post/3lkr3emocuf2aseen13 days ago
automationCVE-2025-24472https://www.darkreading.com/cyberattacks-data-breaches/critical-fortinet-vulnerability-draws-fresh-attentionseen13 days ago
automationCVE-2025-24472https://bsky.app/profile/leekthehack.bsky.social/post/3lkqpoph7m226seen13 days ago
automationCVE-2025-24472https://bsky.app/profile/getpokemon7.bsky.social/post/3lkqagmsrbk23seen13 days ago
automationCVE-2025-24472https://bsky.app/profile/nimblenerd.social/post/3lkq5hxaibh2hseen13 days ago
automationCVE-2025-24472https://bsky.app/profile/cyberalerts.bsky.social/post/3lkpgiuuqqr2gseen13 days ago
automationCVE-2025-24472https://bsky.app/profile/kitafox.bsky.social/post/3lkontmgegz2pseen13 days ago
automationCVE-2025-24472MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen14 days ago
automationCVE-2025-24472https://feedsin.space/feed/CISAKevBot/items/3601808seen14 days ago
automationCVE-2025-24472https://bsky.app/profile/cyberalerts.bsky.social/post/3lkocgfsnuj2vseen14 days ago
automationCVE-2025-24472https://poliverso.org/objects/0477a01e-434752eb-9013b44215ce0300seen14 days ago
automationCVE-2025-24472https://bsky.app/profile/getpokemon7.bsky.social/post/3lkfjvql4yc23seen17 days ago
automationCVE-2025-24472https://bsky.app/profile/dinosn.bsky.social/post/3lkfbhtfytk2iseen17 days ago
automationCVE-2025-24472https://bsky.app/profile/beikokucyber.bsky.social/post/3lkej27gwaq2xseen18 days ago
automationCVE-2025-24472https://bsky.app/profile/securityrss.bsky.social/post/3lkdjqfbhb42nseen18 days ago
automationCVE-2025-24472https://bsky.app/profile/moksec.fi/post/3lkd42mhgas2yseen18 days ago
automationCVE-2025-24472https://bsky.app/profile/lemagit.bsky.social/post/3li4km24bba25seen1 month ago
automationCVE-2025-24472https://poliverso.org/objects/0477a01e-883f3eb8-08a25dda99e455f0seen1 month ago
automationCVE-2025-24472https://bsky.app/profile/getpokemon7.bsky.social/post/3lhy5j6asos2aseen1 month ago
automationCVE-2025-24472https://bsky.app/profile/rcinghio.bsky.social/post/3lhxpvss57k2lseen1 month ago
automationCVE-2025-24472https://infosec.exchange/users/screaminggoat/statuses/113988821911451668seen1 month ago
automationCVE-2025-24472https://threatintel.cc/2025/02/11/attackers-exploit-a-new-zeroday.htmlseen1 month ago
automationCVE-2025-24472https://infosec.exchange/users/screaminggoat/statuses/113988120596426086seen1 month ago
automationCVE-2025-24472https://infosec.exchange/users/screaminggoat/statuses/113987964794104921seen1 month ago
automationCVE-2025-24472https://infosec.exchange/users/screaminggoat/statuses/113987843242570130seen1 month ago
automationCVE-2025-24472https://bsky.app/profile/ethicalhack3r.bsky.social/post/3lhwhxz5sv226seen1 month ago
automationCVE-2025-24472https://bsky.app/profile/hackingne.ws/post/3lhwhjbqr4b2kseen1 month ago
automationCVE-2025-24472https://bsky.app/profile/mynameisv.bsky.social/post/3lhwfjmw5f22tseen1 month ago
automationCVE-2025-24472https://infosec.exchange/users/screaminggoat/statuses/113986913463438541seen1 month ago
automationCVE-2025-24472https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw5zjjgoa2pseen1 month ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3lld6doohl62iseen5 days ago
automationCVE-2024-55591https://bsky.app/profile/redteamnews.bsky.social/post/3ll3o7aocl22yseen8 days ago
automationCVE-2024-55591https://bsky.app/profile/redteamnews.bsky.social/post/3ll3dx7xtzq2rseen8 days ago
automationCVE-2024-55591https://bsky.app/profile/helma.mastodon.social.ap.brid.gy/post/3lkxbkpcfwfe2seen10 days ago
automationCVE-2024-55591https://infosec.exchange/users/dfncert/statuses/114196958656449758seen11 days ago
automationCVE-2024-55591https://bsky.app/profile/getpokemon7.bsky.social/post/3lkqagmsrbk23seen13 days ago
automationCVE-2024-55591https://poliverso.org/objects/0477a01e-434752eb-9013b44215ce0300seen14 days ago
automationCVE-2024-55591https://bsky.app/profile/getpokemon7.bsky.social/post/3lkfjvql4yc23seen17 days ago
automationCVE-2024-55591https://bsky.app/profile/dinosn.bsky.social/post/3lkfbhtfytk2iseen17 days ago
automationCVE-2024-55591https://bsky.app/profile/securityrss.bsky.social/post/3lkdjqfbhb42nseen18 days ago
automationCVE-2024-55591https://bsky.app/profile/moksec.fi/post/3lkd42mhgas2yseen18 days ago
automationCVE-2024-55591https://bsky.app/profile/pentest-tools.bsky.social/post/3lk6f6cbibc2xseen20 days ago
automationCVE-2024-55591MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen1 month ago
automationCVE-2024-55591https://advisories.ncsc.nl/advisory?id=NCSC-2025-0053seen1 month ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3li6pikl2y224seen1 month ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3li4am7meod2eseen1 month ago
automationCVE-2024-55591https://poliverso.org/objects/0477a01e-883f3eb8-08a25dda99e455f0seen1 month ago
automationCVE-2024-55591https://bsky.app/profile/getpokemon7.bsky.social/post/3lhxbcopgds2eseen1 month ago
automationCVE-2024-55591https://infosec.exchange/users/screaminggoat/statuses/113988120596426086seen1 month ago
automationCVE-2024-55591https://infosec.exchange/users/screaminggoat/statuses/113987964794104921seen1 month ago
automationCVE-2024-55591https://bsky.app/profile/ethicalhack3r.bsky.social/post/3lhwhxz5sv226seen1 month ago
automationCVE-2024-55591https://bsky.app/profile/hackingne.ws/post/3lhwhjbqr4b2kseen1 month ago
automationCVE-2024-55591https://infosec.exchange/users/screaminggoat/statuses/113986913463438541seen1 month ago
automationCVE-2024-55591https://fosstodon.org/users/cedric/statuses/113986854216787820seen1 month ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3lhu6rya6me2lseen1 month ago
automationCVE-2024-55591https://bsky.app/profile/getpokemon7.bsky.social/post/3lgyf6iubvs25seen2 months ago
automationCVE-2024-55591https://poliverso.org/objects/0477a01e-a092c8af-59609e899446f907seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/sambowne.infosec.exchange.ap.brid.gy/post/3lgvzyrp3rft2seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/kitafox.bsky.social/post/3lgvzgvnglb2yseen2 months ago
automationCVE-2024-55591https://chaos.social/users/christopherkunz/statuses/113913534935679492seen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/screaminggoat/statuses/113912632267283246seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/test-cvp.bsky.social/post/3lgv4fbh6wp2kseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/binitamshah.bsky.social/post/3lguyw3lars2hseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3lgu3zuu3m22iseen2 months ago
automationCVE-2024-55591https://mastodon.social/users/verbrecher/statuses/113908117096718221seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/ehcgroup.bsky.social/post/3lgte3zueys2aseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/aakl.bsky.social/post/3lgt3xglnxk27seen2 months ago
automationCVE-2024-55591https://mastodon.social/users/verbrecher/statuses/113906207813054710seen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/dragonjar/statuses/113905636502167055seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/decrypt.lol/post/3lgrbnznfsc23seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/darkwebinformer.bsky.social/post/3lgqr6xbgsc27seen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/DarkWebInformer/statuses/113902167310906026seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/r-netsec.bsky.social/post/3lgqmhq3sjc2hseen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/mttaggart/statuses/113901810623148521seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/taggart-tech.com/post/3lgqm4pbvp22eseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/tmjintel.bsky.social/post/3lgqlmhflgf2nseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/auditum.fr/post/3lgqiascdk32dseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/hacker.at.thenote.app/post/3lgfbhheb6s2nseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/schubringglobal.bsky.social/post/3lgeolknay42lseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/tamosan.bsky.social/post/3lgekawsf562xseen2 months ago
automationCVE-2024-55591https://threatintel.cc/2025/01/22/patch-procrastination-leaves-fortinet-firewalls.htmlseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/jbhall56.bsky.social/post/3lgdgxmipls2tseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/jcsc.je/post/3lgd4t4s3tx24seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lgctsvrw5s2yseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/potato.software/post/3lg73k65wce25seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/aakl.bsky.social/post/3lg72zcavts2useen2 months ago
automationCVE-2024-55591https://bsky.app/profile/reynardsec.bsky.social/post/3lg6kbsw3vs2gseen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/shadowserver/statuses/113860748406082477seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/shadowserver.bsky.social/post/3lg6egouhb22oseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/shadowserver.bsky.social/post/3lg6egnpho22oseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/shadowserver.bsky.social/post/3lg6egi5vzk2oseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/decrypt.lol/post/3lg4nirllpc2qseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/tmjintel.bsky.social/post/3lg3rxnvsng2xseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/dinosn.bsky.social/post/3lg2w63x76s2fseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/getpokemon7.bsky.social/post/3lfz7qdwxcs2cseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3lfyexcckev2iseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/onyphe.bsky.social/post/3lfxdtuboyk27seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/elhackernet.extwitter.link/post/3lfwlbt2ybk26seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/rajsamani.bsky.social/post/3lfwhhkvnok2hseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3lfvv47y3tn2bseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3lfvqijz3rz2mseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3lfvqep6mhp2kseen2 months ago
automationCVE-2024-55591https://poliverso.org/objects/0477a01e-6367-8991-2a25-967351091071seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/darkwebinformer.bsky.social/post/3lfuwzgvth22zseen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/DarkWebInformer/statuses/113839527100179725seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/catc0n.bsky.social/post/3lfutoo46r22lseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/catc0n.bsky.social/post/3lfut6n3yfk2lseen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/catc0n/statuses/113839185805988808seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/hendryadrian.bsky.social/post/3lfuqoytsyg2cseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/hendryadrian.bsky.social/post/3lfuotu647m2jseen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/screaminggoat/statuses/113838917483633394seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/socprime.com/post/3lfughkqn3s2tseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/tmjintel.bsky.social/post/3lfuehtkncy23seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/intruder-io.bsky.social/post/3lfubg3n22c2bseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/s0ufi4n3.bsky.social/post/3lftx6kwwj22qseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/secureinseconds.com/post/3lft5zscw432vseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/hacker.at.thenote.app/post/3lfsqzaxwxk2nseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/hacker.at.thenote.app/post/3lfshyrilsk2nseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/opsmatters.bsky.social/post/3lfsfrjdzjh24seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/peterrobards.bsky.social/post/3lfrzf3vwxs2wseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/basefortify.bsky.social/post/3lfrxwvv2xs2sseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/r-netsec.bsky.social/post/3lfrw4a26kr2xseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/getpokemon7.bsky.social/post/3lfrw2pt2v22xseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/overclockotter.bsky.social/post/3lfrtlf54ms2sseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/jbhall56.bsky.social/post/3lfrt7j3hrk26seen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/jbhall56/statuses/113832503130624371seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/getpokemon7.bsky.social/post/3lfrt5n2e6s27seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/tmjintel.bsky.social/post/3lfrqnt7zbq2jseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/kitafox.bsky.social/post/3lfrlgaij6h23seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/intruder-io.bsky.social/post/3lfrkf6or4k2kseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/ajxchapman.bsky.social/post/3lfrkedi6ps2useen2 months ago
automationCVE-2024-55591https://bsky.app/profile/osanpo.bsky.social/post/3lfrhve2npi2zseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfrfbao6bc25seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfrfa424fs25seen2 months ago
gallyCVE-2024-55591https://www.cert.ssi.gouv.fr/alerte/CERTFR-2025-ALE-002/seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/christopherkunz.bsky.social/post/3lfrbxwpyy22jseen2 months ago
cedricCVE-2024-55591https://www.fortiguard.com/psirt/FG-IR-24-535seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/it-connect.bsky.social/post/3lfr6xq3dty2cseen2 months ago
automationCVE-2024-55591MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123seen2 months ago
automationCVE-2024-55591https://feedsin.space/feed/CISAKevBot/items/3102895seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/theregister.com/post/3lfq4ljgt6s22seen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/screaminggoat/statuses/113828555456067528seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/hackingne.ws/post/3lfpx2qrpbk2aseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/infosec.skyfleet.blue/post/3lfpwgojxzk2jseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lfpu35bdxth2seen2 months ago
automationCVE-2024-55591https://cyberplace.social/users/GossiTheDog/statuses/113828060350738157seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/infosec.skyfleet.blue/post/3lfprokdudp2xseen2 months ago
automationCVE-2024-55591https://bsky.app/profile/cert-fr.bsky.social/post/3lfpqfnmjy22sseen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/cve/statuses/113827768500530581seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/kpwn.infosec.exchange.ap.brid.gy/post/3lfpmziaa7t42seen2 months ago
automationCVE-2024-55591https://bsky.app/profile/mariusavram.bsky.social/post/3lfpli7sefc2rseen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/screaminggoat/statuses/113827355879730690seen2 months ago
automationCVE-2024-55591https://mastodon.social/users/CyberSignaler/statuses/113827257320064030seen2 months ago
automationCVE-2024-55591https://infosec.exchange/users/screaminggoat/statuses/113827171069136576seen2 months ago