Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Authentication Bypass in Security Edge Appliances: What You Should Know

Discover the key information you need to know about authentication bypass using a recently discovered vulnerability in a next-gen firewall as a case study.

Beginner
19m
(3)

Created by Matthew Lloyd Davies and Michael Teske

Last Updated Feb 08, 2025

Course Thumbnail
  • Course

Authentication Bypass in Security Edge Appliances: What You Should Know

Discover the key information you need to know about authentication bypass using a recently discovered vulnerability in a next-gen firewall as a case study.

Beginner
19m
(3)

Created by Matthew Lloyd Davies and Michael Teske

Last Updated Feb 08, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

In this episode of What You Should Know we look at authentication bypass in security edge appliances. Attackers are increasingly targeting edge devices to gain initial access to victim environments, with 2024 seeing the largest ever year-on-year rise in incidents that resulted in an impact. Using CVE-2024-55591, an authentication bypass vulnerability affecting FortiOS and FortiProxy as a case study, we’ll explore analysis by Arctic wolf that monitored threat actors who used this weakness to gain super-admin access to Fortinet’s next-generation firewall. With this course, you’ll understand what this vulnerability means to you, what indicators of compromise to look for in your environment, and the steps you need to take to mitigate your organization’s exposure.

Authentication Bypass in Security Edge Appliances: What You Should Know
Beginner
19m
(3)
Table of contents

About the author
Matthew Lloyd Davies - Pluralsight course - Authentication Bypass in Security Edge Appliances: What You Should Know
Matthew Lloyd Davies
41 courses 4.7 author rating 47 ratings

Matt has a degree in Chemical engineering and a PhD in mathematical chemistry. He is also a GIAC certified incident handler and penetration tester and has regulated cyber security in the UK civil nuclear sector for many years.

About the author
Michael Teske - Pluralsight course - Authentication Bypass in Security Edge Appliances: What You Should Know
Michael Teske
71 courses 4.5 author rating 888 ratings

Michael Teske is an Author Evangelist with Pluralsight helping people elevate their skills. He has 20+ years of experience in IT Ops, including 17 as an IT instructor at a community college.

Get started with Pluralsight