CVE-2025-59718
CVE-2025-59719
December 18, 2025
·
0
Minutes Read

Fortinet FortiCloud SSO Authentication Bypass Vulnerabilities Actively Exploited (CVE-2025-59718, CVE-2025-59719)

Advisory
Security Advisory
December 18, 2025
·
0
Minutes Read

Fortinet FortiCloud SSO Authentication Bypass Vulnerabilities Actively Exploited (CVE-2025-59718, CVE-2025-59719)

Advisory
Security Advisory
December 18, 2025
·
0
Minutes Read
Kudelski Security Team
Find out more
table of contents
Share on
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Summary

Active exploitation of critical Fortinet authentication bypass vulnerabilities (CVE-2025-59718 and CVE-2025-59719) was observed beginning December 12, 2025. These vulnerabilities allow unauthenticated attackers to bypass Single Sign-On (SSO) authentication on affected Fortinet appliances via crafted SAML messages when FortiCloud SSO is enabled.

Observed intrusions involved successful malicious SSO logins - primarily to the admin account - followed by the export of device configurations via the GUI. Fortinet released patches on December 9, 2025, and it was confirmed in-the-wild exploitation shortly thereafter.

Affected Systems and/or Applications

The following Fortinet products are affected if FortiCloud SSO is enabled:

  • FortiOS
  • FortiProxy
  • FortiSwitchManager
  • FortiWeb

FortiCloud SSO is disabled by default; however, it may be automatically enabled when devices are registered through FortiCare via the GUI unless explicitly disabled.

Products Confirmed Unaffected:

  • FortiOS 6.4
  • FortiWeb 7.0
  • FortiWeb 7.2

Technical Details

The vulnerabilities allow unauthenticated attackers to bypass SSO authentication by submitting specially crafted SAML messages to FortiCloud SSO-enabled devices. Successful exploitation results in administrative access without valid credentials.

Observed Indicators of Compromise (IOCs)

Malicious SSO login activity originated from the following IP addresses and hosting providers:

IOC Hosting Provider
45.32.153[.]218 The Constant Company LLC
167.179.76[.]111 The Constant Company LLC
199.247.7[.]82 The Constant Company LLC
45.61.136[.]7 BL Networks
38.54.88[.]203 Kaopu Cloud HK Limited
38.54.95[.]226 Kaopu Cloud HK Limited
38.60.212[.]97 Kaopu Cloud HK Limited

Example Log Evidence

The example log evidence shown are Fortinet FortiGate system event logs, specifically administrative authentication and management activity logs generated by the FortiOS operating system.

Successful malicious SSO login:

logdesc="Admin login successful" user="admin" ui="sso(199.247.7[.]82)" method="sso"

Configuration exfiltration via GUI following login:

action="download" msg="System config file has been downloaded by user admin via GUI(199.247.7[.]82)"

Mitigation

Immediate Actions

  • Upgrade to a fixed version of all affected Fortinet products as soon as possible.
  • Assume credential compromise if malicious SSO login or configuration downloads are detected and reset all firewall and administrative credentials immediately.

Recommended Fixed Versions

Product Affected Versions Fixed Version
FortiOS 7.6 7.6.0 – 7.6.3 7.6.4+
FortiOS 7.4 7.4.0 – 7.4.8 7.4.9+
FortiOS 7.2 7.2.0 – 7.2.11 7.2.12+
FortiOS 7.0 7.0.0 – 7.0.17 7.0.18+
FortiProxy 7.6 7.6.0 – 7.6.3 7.6.4+
FortiProxy 7.4 7.4.0 – 7.4.10 7.4.11+
FortiProxy 7.2 7.2.0 – 7.2.14 7.2.15+
FortiProxy 7.0 7.0.0 – 7.0.21 7.0.22+
FortiSwitchManager 7.2 7.2.0 – 7.2.6 7.2.7+
FortiSwitchManager 7.0 7.0.0 – 7.0.5 7.0.6+
FortiWeb 8.0 8.0.0 8.0.1+
FortiWeb 7.6 7.6.0 – 7.6.4 7.6.5+
FortiWeb 7.4 7.4.0 – 7.4.9 7.4.10+

Temporary Workaround

Until systems are upgraded, disable FortiCloud SSO login:

GUI:

  • System → Settings → Disable “Allow administrative login using FortiCloud SSO”

CLI:

config system global
set admin-forticloud-sso-login disable
end

Additional Hardening Recommendations

  • Restrict management interface access to trusted internal networks only.
  • Monitor logs for unexpected SSO-based admin logins and configuration downloads.
  • Block or monitor traffic from known malicious IP addresses listed above.

What the Cyber Fusion Center is Doing

The CFC is monitoring the situation and is triggering a threat-hunting campaigns. This advisory will be updated if required. Clients subscribed to our vulnerability scan services will receive relevant results if critical vulnerabilities are found within the scope of the scans as soon as a relevant plugin is made available by the scan provider.

Tenable ID:

  • 277980 – Fortinet FortiGate SSO Login Authentication Bypass (FG-IR-25-647)
  • 277981 – Fortinet FortiWeb SSO Login Authentication Bypass (FG-IR-25-647)

Qualys ID:

  • QID 44861
  • QID 44862

References

Related Post