{"vulnerability": "CVE-2024-40591", "sightings": [{"uuid": "9202c40c-4efd-4d1e-8fbf-0da9e6b4c202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40591", "type": "seen", "source": "https://bsky.app/profile/hackread.bsky.social/post/3li2qlzf7is2o", "content": "", "creation_timestamp": "2025-02-13T13:00:22.555593Z"}, {"uuid": "20833d21-fa6e-48ae-834c-949cf747a636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40591", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113986285700594891", "content": "", "creation_timestamp": "2025-02-11T16:51:29.948827Z"}, {"uuid": "2094c04e-9ddd-421a-9638-3a7227841795", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40591", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw5ydxery2s", "content": "", "creation_timestamp": "2025-02-11T17:16:35.124849Z"}, {"uuid": "7fa89e17-0594-4db2-973a-4480783ef7a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40591", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113986497919466758", "content": "", "creation_timestamp": "2025-02-11T17:45:29.327311Z"}, {"uuid": "9bf9d43f-72b0-4f6d-a4d8-3c70185f26e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40591", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "19ae2c87-5209-4710-bd0f-abac538c0ee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40591", "type": "seen", "source": "https://bsky.app/profile/dragstersystems.bsky.social/post/3li6bn5gvec2x", "content": "", "creation_timestamp": "2025-02-14T22:43:15.315418Z"}, {"uuid": "bd6cfb8a-2410-42eb-af26-3ff9502766d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40591", "type": "seen", "source": "https://bsky.app/profile/elhacker.net/post/3li7hicfhni2v", "content": "", "creation_timestamp": "2025-02-15T10:00:32.299401Z"}, {"uuid": "20e568a7-459b-4ca4-badc-c3d4a9bf5614", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40591", "type": "seen", "source": "https://t.me/cvedetector/17731", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-40591 - Fortinet FortiOS Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-40591 \nPublished : Feb. 11, 2025, 5:15 p.m. | 58\u00a0minutes ago \nDescription : An incorrect privilege assignment vulnerability [CWE-266] in Fortinet FortiOS version 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9 and before 7.0.15 allows an authenticated admin whose access profile has the Security Fabric permission to escalate their privileges to super-admin by connecting the targetted FortiGate to a malicious upstream FortiGate they control. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T19:53:04.000000Z"}]}