Article Details
Scrape Timestamp (UTC): 2025-12-16 11:05:47.747
Source: https://thehackernews.com/2025/12/fortinet-fortigate-under-active-attack.html
Original Article Text
Click to Toggle View
Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass. Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure. Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances on December 12, 2025. The attacks exploit two critical authentication bypasses (CVE-2025-59718 and CVE-2025-59719, CVSS scores: 9.8). Patches for the flaws were released by Fortinet last week for FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager. "These vulnerabilities allow unauthenticated bypass of SSO login authentication via crafted SAML messages, if the FortiCloud SSO feature is enabled on affected devices," Arctic Wolf Labs said in a new bulletin. It's worth noting that while FortiCloud SSO is disabled by default, it is automatically enabled during FortiCare registration unless administrators explicitly turn it off using the "Allow administrative login using FortiCloud SSO" setting in the registration page. In the malicious activity observed by Arctic Wolf, IP addresses associated with a limited set of hosting providers, such as The Constant Company llc, Bl Networks, and Kaopu Cloud Hk Limited, were used to carry out malicious SSO logins against the "admin" account. Following the logins, the attackers have been found to export device configurations via the GUI to the same IP addresses. In light of ongoing exploitation activity, organizations are advised to apply the patches as soon as possible. As mitigations, it's essential to disable FortiCloud SSO until the instances are updated to the latest version and limit access to management interfaces of firewalls and VPNs to trusted internal users. "Although credentials are typically hashed in network appliance configurations, threat actors are known to crack hashes offline, especially if credentials are weak and susceptible to dictionary attacks," Arctic Wolf said. Fortinet customers who find indicators of compromise (IoCs) consistent with the campaign are recommended to assume compromise and reset hashed firewall credentials stored in the exfiltrated configurations.
Daily Brief Summary
Cyber attackers are exploiting two critical vulnerabilities in Fortinet FortiGate devices, identified as CVE-2025-59718 and CVE-2025-59719, with CVSS scores of 9.8.
Arctic Wolf reported active intrusions involving malicious single sign-on logins on FortiGate appliances as of December 12, 2025.
These vulnerabilities allow unauthenticated bypass of SSO login authentication via crafted SAML messages when FortiCloud SSO is enabled.
Fortinet has released patches for the affected products, including FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager, urging immediate application.
Attackers have used IP addresses from specific hosting providers to execute malicious logins and export device configurations.
Organizations are advised to disable FortiCloud SSO and limit management interface access to trusted users until systems are patched.
Fortinet customers should reset hashed firewall credentials if indicators of compromise are detected, as weak credentials may be cracked offline.