Threat Insight
Actively Exploited Authentication Bypass Vulnerabilities in FortiGate SSO
Two critical vulnerabilities has been disclosed earlier by FortiNet[1].
These vulnerabilities allow unauthenticated bypass of SSO login authentication by usingmcrafted SAML messages, if the FortiCloud SSO feature is enabled on affected Devices[2].
Fortinet has stated in their latest advisory[1] that FortiCloud SSO login is disabled by default in factory settings. However according to ArcticWolf[2], when administrators register devices using FortiCare through the GUI, FortiCloud SSO is enabled upon registration unless the “Allow administrative login using FortiCloud SSO” setting is disabled on the registration page.
CVE
CVE-2025-59718
CVE-2025-59719
Affected Products
FortiOS 7.6
FortiOS 7.4
FortiOS 7.2
FortiOS 7.0
FortiProxy 7.6
FortiProxy 7.4
FortiProxy 7.2
FortiProxy 7.0
FortiSwitchManager 7.2
FortiSwitchManager 7.0
FortiWeb 8.0
FortiWeb 7.6
FortiWeb 7.4
Exploitation
According to ArcticWolf, these vulnerabilities has been exploited in the wild[2].
Recommended Actions
If you have seen any malicious logins similar to the example log under “Detection”, Truesec recommends resetting firewall credentials and that you initiate an investigation to understand the full extent of the compromise. Furthermore, it is highly recommended that access to management interfaces on FortiNet devices are limited to trusted IP addresses.
Lastly, Truesec recommends upgrading to the latest fixed version, see table below.
List of affected products, vulnerable versions and fixed versions:
FortiOS 7.6 – 7.6.0 through 7.6.3 – Upgrade to 7.6.4 or above
FortiOS 7.4 – 7.4.0 through 7.4.8 – Upgrade to 7.4.9 or above
FortiOS 7.2 – 7.2.0 through 7.2.11 – Upgrade to 7.2.12 or above
FortiOS 7.0 – 7.0.0 through 7.0.17 – Upgrade to 7.0.18 or above
FortiOS 6.4 – Not affected – Not Applicable
FortiProxy 7.6 – 7.6.0 through 7.6.3 – Upgrade to 7.6.4 or above
FortiProxy 7.4 – 7.4.0 through 7.4.10 – Upgrade to 7.4.11 or above
FortiProxy 7.2 – 7.2.0 through 7.2.14 – Upgrade to 7.2.15 or above
FortiProxy 7.0 – 7.0.0 through 7.0.21 – Upgrade to 7.0.22 or above
FortiSwitchManager 7.2 – 7.2.0 through 7.2.6 – Upgrade to 7.2.7 or above
FortiSwitchManager 7.0 – 7.0.0 through 7.0.5 – Upgrade to 7.0.6 or above
FortiWeb 8.0 – 8.0.0 – Upgrade to 8.0.1 or above
FortiWeb 7.6 – 7.6.0 through 7.6.4 – Upgrade to 7.6.5 or above
FortiWeb 7.4 – 7.4.0 through 7.4.9 – Upgrade to 7.4.10 or above
FortiWeb 7.2 – Not affected – Not Applicable
FortiWeb 7.0 – Not affected – Not Applicable
Detection
Malicious logins were typically against the admin account, as shown in the example log line below[2]:
date=2025-12-12 time=REDACTED devname=REDACTED devid=REDACTED eventtime=REDACTED tz=REDACTED logid=”0100032001″ type=”event” subtype=”system” level=”information” vd=”root” logdesc=”Admin login successful” sn=REDACTED user=”admin” ui=”sso(199.247.7[.]82)” method=”sso” srcip=199.247.7[.]82 dstip=REDACTED action=”login” status=”success” reason=”none” profile=”super_admin” msg=”Administrator admin logged in successfully from sso(199.247.7[.]82)”
Following malicious SSO logins, configurations were exported to the same IP addresses via the GUI interface[2]:
date=2025-12-12 time=REDACTED devname=REDACTED devid=REDACTED eventtime=REDACTED tz=REDACTED logid=”0100032095″ type=”event” subtype=”system” level=”warning” vd=”root” logdesc=”Admin performed an action from GUI” user=”admin” ui=”GUI(199.247.7[.]82)” action=”download” status=”success” msg=”System config file has been downloaded by user admin via GUI(199.247.7[.]82)”
References
[1] https://fortiguard.fortinet.com/psirt/FG-IR-25-647
[2] https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-sso-logins-following-disclosure-cve-2025-59718-cve-2025-59719/
Stay ahead with cyber insights
Newsletter
Stay ahead in cybersecurity! Sign up for Truesec’s newsletter to receive the latest insights, expert tips, and industry news directly to your inbox. Join our community of professionals and stay informed about emerging threats, best practices, and exclusive updates from Truesec.