What happened
Threat actors have started exploiting newly disclosed critical vulnerabilities in Fortinet products to perform malicious single sign-on (SSO) logins on FortiGate firewalls and related appliances. The activity was first observed on December 12, 2025, just days after Fortinet disclosed and patched two authentication-bypass flaws (CVE-2025-59718 and CVE-2025-59719) that allow attackers to bypass FortiCloud SSO authentication via crafted SAML messages when that feature is enabled. Security researchers at Arctic Wolf and others have reported multiple intrusions where attackers have logged in to administrative interfaces without credentials and, in some cases, exported device configuration files.
Who is affected
Organizations using Fortinet FortiGate firewalls and related products (including FortiOS, FortiWeb, FortiProxy, FortiSwitchManager) with the FortiCloud SSO login feature enabled are at risk. Because FortiCloud SSO is enabled by default during initial device setup unless explicitly disabled, many internet-connected appliances could be exposed. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the issue to its Known Exploited Vulnerabilities catalog, underscoring its active exploitation.
Why CISOs should care
- Active exploitation: Threat actors are already leveraging these SSO authentication bypasses in real-world attacks shortly after disclosure and patch publication.
- High severity: Both vulnerabilities carry near-maximum CVSS scores, enabling unauthorized administrative access without valid credentials.
- Privileged access risk: Successful exploitation can expose firewall configurations, hashed credentials, and network security policies, potentially facilitating broader compromise of enterprise environments.
3 Practical actions
- Patch Immediately: Ensure all Fortinet products are updated to the latest fixed versions addressing CVE-2025-59718 and CVE-2025-59719.
- Disable FortiCloud SSO: Turn off the “Allow administrative login using FortiCloud SSO” feature where it is currently enabled until patches are verified applied.
- Hunt, Restrict & Reset: Search for signs of malicious logins, restrict management interfaces to internal trusted networks, and reset compromised firewall credentials if suspicious activity is found.
