Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-55599 | First vendor Publication | 2025-07-08 |
Vendor | Cve | Last vendor Modification | 2025-07-08 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiOS version 7.6.0, version 7.4.7 and below, 7.0 all versions, 6.4 all versions and FortiProxy version 7.6.1 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions may allow a remote unauthenticated user to bypass the DNS filter via Apple devices. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55599 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-358 | Improperly Implemented Security Check for Standard |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2025-07-09 17:20:34 |
|
2025-07-08 21:20:36 |
|