Article Details
Scrape Timestamp (UTC): 2026-01-23 12:33:29.640
Source: https://thehackernews.com/2026/01/fortinet-confirms-active-forticloud-sso.html
Original Article Text
Click to Toggle View
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls. Fortinet has officially confirmed that it's working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh exploitation activity on fully-patched firewalls. "In the last 24 hours, we have identified a number of cases where the exploit was to a device that had been fully upgraded to the latest release at the time of the attack, which suggested a new attack path," Fortinet Chief Information Security Officer (CISO) Carl Windsor said in a Thursday post. The activity essentially mounts to a bypass for patches put in place by the network security vendor to address CVE-2025-59718 and CVE-2025-59719, which could allow unauthenticated bypass of SSO login authentication via crafted SAML messages if the FortiCloud SSO feature is enabled on affected devices. The issues were originally addressed by Fortinet last month. However, earlier this week, reports emerged of renewed activity in which malicious SSO logins on FortiGate appliances were recorded against the admin account on devices that had been patched against the twin vulnerabilities. The activity is similar to incidents observed in December, shortly after the disclosure of the CVE-2025-59718 and CVE-2025-59719. The activity involves the creation of generic accounts for persistence, making configuration changes granting VPN access to those accounts, and the exfiltration of firewall configurations to different IP addresses. The threat actor has been observed logging in with accounts named "cloud-noc@mail.io" and "cloud-init@mail.io." As mitigations, the company is urging the following actions - "It is important to note that while, at this time, only exploitation of FortiCloud SSO has been observed, this issue is applicable to all SAML SSO implementations," Fortinet said.
Daily Brief Summary
Fortinet confirms a new attack path exploiting the FortiCloud SSO bypass vulnerability on fully-patched FortiGate firewalls, affecting devices upgraded to the latest release.
The vulnerability, related to CVE-2025-59718 and CVE-2025-59719, allows unauthorized bypass of SSO login authentication through crafted SAML messages if FortiCloud SSO is enabled.
Recent malicious activity includes unauthorized logins to admin accounts, creation of generic accounts, and exfiltration of firewall configurations to external IP addresses.
The threat actor utilizes accounts named "cloud-noc@mail.io" and "cloud-init@mail.io" to maintain persistence and make unauthorized configuration changes.
Fortinet advises immediate mitigation steps, emphasizing the vulnerability's applicability to all SAML SSO implementations, not just FortiCloud SSO.
The company is actively working to address the vulnerability and prevent further exploitation, highlighting the need for continuous monitoring and patch management.
Organizations using FortiGate appliances should review security configurations and ensure compliance with Fortinet's recommended security practices to mitigate risks.