CybersecurityFortiCloud SSO Authentication Bypass Vulnerability Under Active Exploit

FortiCloud SSO Authentication Bypass Vulnerability Under Active Exploit

Key Takeaways

  • Fortinet has confirmed the active exploitation of a FortiCloud SSO authentication bypass vulnerability, which affects FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.
  • The vulnerability allows unauthenticated attackers to bypass SSO authentication using crafted SAML messages, enabling admin access without credentials.
  • Cybersecurity firm Arctic Wolf has observed a new automated campaign targeting even fully patched FortiGate devices, with incidents occurring seconds apart.
  • The attacks involve rapid configuration exfiltration and persistence via generic admin accounts, and have been reported on updated firmware such as 7.4.10.
  • Fortinet urges users to disable FortiCloud SSO and implement local-in policies to restrict admin access, and to treat compromised devices as fully owned.

Introduction to the Vulnerability
The FortiCloud SSO authentication bypass vulnerability is a critical issue that has been confirmed by Fortinet, with active exploitation reported in the wild. This vulnerability affects various Fortinet products, including FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager, and allows unauthenticated attackers to bypass SSO authentication using crafted SAML messages. As a result, attackers can gain admin access to the system without credentials, which can lead to further exploitation and compromise. In December 2025, Fortinet disclosed two critical vulnerabilities, CVE-2025-59718 and CVE-2025-59719, which enable this type of attack.

Affected Versions and Solutions
The FortiCloud SSO authentication bypass vulnerability affects various versions of Fortinet products, including FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, and FortiOS 7.2.0 through 7.2.11, among others. Fortinet has issued patches for these vulnerabilities, and users are advised to upgrade to the latest firmware to mitigate the issue. However, reports have confirmed that the vulnerability is still being exploited on updated firmware, such as 7.4.9 and 7.4.10, which suggests that the issue may be more complex than initially thought. The affected versions and solutions are outlined in Fortinet’s PSIRT advisory, which provides detailed information on the vulnerable versions and the necessary fixes.

Attack Campaign Details
The attack campaign targeting FortiGate devices has been observed by cybersecurity firm Arctic Wolf, which has reported that the attacks are highly automated and involve rapid configuration exfiltration and persistence via generic admin accounts. The attacks occur seconds apart, targeting internet-exposed devices, and have been reported on over 25,000 devices that had SSO enabled. The attackers use malicious SSO logins, such as "[email protected]", to gain access to the system, and then exfiltrate configurations via the GUI for offline credential cracking. Additionally, the attackers create persistence accounts that grant VPN access, allowing them to maintain a foothold in the system. The IOCs (Indicators of Compromise) for this attack campaign include specific user accounts, IP addresses, and persistence accounts, which can be used to detect and respond to the attack.

Mitigation and Remediation
To mitigate the FortiCloud SSO authentication bypass vulnerability, Fortinet urges users to disable FortiCloud SSO and implement local-in policies to restrict admin access. This can be done by running a series of commands, including "config system global" and "set admin-forticloud-sso-login disable". Additionally, users should treat compromised devices as fully owned, which involves upgrading to the latest firmware, restoring clean configurations, rotating all credentials, including LDAP/AD, and auditing VPN settings. By taking these steps, users can reduce the risk of exploitation and prevent further compromise. It is also recommended to search logs for SSO successes from specific IPs and users, and to monitor for "Add system.admin" events, which can indicate a potential attack.

Conclusion and Recommendations
The FortiCloud SSO authentication bypass vulnerability is a serious issue that requires immediate attention from Fortinet users. The active exploitation of this vulnerability, combined with the automated nature of the attack campaign, makes it a significant threat to the security of FortiGate devices. To mitigate this vulnerability, users should disable FortiCloud SSO, implement local-in policies, and treat compromised devices as fully owned. By taking these steps, users can reduce the risk of exploitation and prevent further compromise. It is also important to stay informed about the latest developments and updates on this vulnerability, and to follow best practices for security and risk management.

- Advertisement -spot_img

More From UrbanEdge

Queensland Flood Alerts: Storms to End Extreme Heatwave

Queensland Flood Alerts: Storms to End Extreme Heatwave Projected Rainfall...

Queensland Flood Warning, Alerts & Weekend Forecast

Queensland braces for heavy rain and potential flooding as a low-pressure trough stalls over the state. With predicted rainfall of 100-300mm through Sunday, authorities urge preparedness. SE regions may face disruptions, extending the alert to northeast New South Wales. Prepare emergency kits and plans now...

Brisbane Flood Risk: Storms Predicted to End Heatwave

Brisbane residents brace for storms set to end the relentless heatwave. Expect heavy rainfall, with up to 150mm in some areas, increasing flood risks, especially in low-lying regions. Flash floods are possible, and temperatures could drop by 10 degrees. Prepare emergency kits and stay updated on weather developments...

Apple Zero-Day Fix: Sophisticated Attack Solution & Patch

Apple has urgently patched two zero-day vulnerabilities in WebKit used in highly complex attacks targeting specific individuals. Security experts emphasize immediate updates to protect against these threats, linked to advanced actors, possibly nation-states. The overlapping nature of these exploits suggests a coordinated effort...

Windows 11 Notepad Vulnerability: Silent File Execution via Markdown Links

A critical vulnerability in Windows 11 Notepad's Markdown feature allows remote code execution via malicious links, posing a serious risk to users. Microsoft has issued a patch, but immediate updates and extra defenses are essential to prevent exploitation and ensure secure computing environments...

Microsoft Store Outlook Add-in Hijack Steals 4,000 Accounts

A sophisticated attack on Microsoft Outlook users has emerged, compromising over 4,000 accounts through the hijacked AgreeTo add-in. Hackers exploited an abandoned domain to steal Microsoft credentials directly from the Marketplace, bypassing usual security measures and impacting both user data and financial information...

CISA Mandate: Upgrade & Identify Unsupported Edge Devices for Agencies

CISA mandates federal agencies to replace unsupported edge devices prone to advanced threat actor exploits. Agencies have three months to identify, 12 months to begin upgrades, and 18 months for full remediation to protect network perimeters from cyber threats. SecureEdge Solutions offers assistance in securing network vulnerabilities...

Coinbase Insider Breach: Leaked Support Tool Screenshots

In May 2025, Coinbase experienced a sophisticated insider breach affecting 70,000 users. Hackers bribed support agents to leak sensitive data, resulting in over $2 million in theft through targeted scams. Coinbase responded by refusing ransom, launching a bounty program, and refunding victims...

Sector Impact Overview: Architecting the AI Integration Era

Sector Impact Overview: Architecting the AI Integration Era 1. Introduction:...
- Advertisement -spot_img