{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-15T23:24:19.200","vulnerabilities":[{"cve":{"id":"CVE-2024-55599","sourceIdentifier":"psirt@fortinet.com","published":"2025-07-08T15:15:23.870","lastModified":"2025-07-22T16:22:46.130","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiOS version 7.6.0, version 7.4.7 and below, 7.0 all versions, 6.4 all versions and FortiProxy version 7.6.1 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions may allow a remote unauthenticated user to bypass the DNS filter via Apple devices."},{"lang":"es","value":"Una comprobación de seguridad implementada incorrectamente para la vulnerabilidad estándar [CWE-358] en FortiOS versión 7.6.0, versión 7.4.7 y anteriores, 7.0 todas las versiones, 6.4 todas las versiones y FortiProxy versión 7.6.1 y anteriores, versión 7.4.8 y anteriores, 7.2 todas las versiones, 7.0 todas las versiones puede permitir que un usuario remoto no autenticado evite el filtro DNS a través de dispositivos Apple."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-358"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.4.9","matchCriteriaId":"BE879BBE-A7E4-4F8F-9A64-C83A8A28A4D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*","versionStartIncluding":"7.6.0","versionEndExcluding":"7.6.2","matchCriteriaId":"C6E32BEB-8804-452C-A054-DD9FFCC8B796"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisase:24.4.32:*:*:*:-:*:*:*","matchCriteriaId":"4D6D03F1-9422-46BF-8D49-743E89336272"},{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndExcluding":"7.2.11","matchCriteriaId":"753664B2-3AE8-499A-9C8A-B7D928439697"},{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.8","matchCriteriaId":"26515743-5A9A-4885-A08E-535E4ABE0153"},{"vulnerable":true,"criteria":"cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*","matchCriteriaId":"44CE8EE3-D64A-49C8-87D7-C18B302F864A"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-24-053","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}