Original Article Text

Click to Toggle View

Hackers breach Fortinet FortiGate devices, steal firewall configs. Fortinet FortiGate devices are being targeted in automated attacks that create rogue accounts and steal firewall configuration data, according to cybersecurity company Arctic Wolf. The campaign started last week, on January 15, with the attackers exploiting an unknown vulnerability in the devices' single sign-on (SSO) feature to create accounts with VPN access and exporting firewall configurations within seconds, indicating automated activity. Arctic Wolf, which reported these incidents on Wednesday, says the attacks are very similar to incidents it documented in December following the disclosure of a critical authentication bypass vulnerability (CVE-2025-59718) in Fortinet products. That flaw allows unauthenticated attackers to bypass SSO authentication on vulnerable FortiGate firewalls via maliciously crafted SAML messages when FortiCloud SSO features are enabled. "While the parameters of initial access details have not been fully confirmed, the current campaign bears similarity to a campaign described by Arctic Wolf in December 2025," Arctic Wolf said. "It is not known at this time whether the latest threat activity observed is fully covered by the patch that initially addressed CVE-2025-59718 and CVE-2025-59719." Arctic Wolf's advisory follows a wave of reports from Fortinet customers about attackers likely exploiting a patch bypass for the CVE-2025-59718 vulnerability to hack patched firewalls. Affected admins said that Fortinet reportedly confirmed that the latest FortiOS version (7.4.10) doesn't fully address the authentication bypass flaw, which should have already been patched since early December with the release of FortiOS 7.4.9. Fortinet is also allegedly planning to release FortiOS 7.4.11, 7.6.6, and 8.0.0 over the coming days to fully address the CVE-2025-59718 security flaw. Affected Fortinet customers also shared logs showing that the attackers created admin users after an SSO login from cloud-init@mail.io on IP address 104.28.244.114, which matches indicators of compromise detected by Arctic Wolf while analyzing ongoing FortiGate attacks and previous exploitation the cybersecurity firm observed in December. Disable FortiCloud SSO to block attacks Until Fortinet fully patches FortiOS against these ongoing attacks, admins can secure their firewalls by temporarily turning off the vulnerable FortiCloud login feature (if enabled) by going to System -> Settings and switching "Allow administrative login using FortiCloud SSO" to Off. Another option is to run the following commands from the command-line interface: Internet security watchdog Shadowserver is currently tracking nearly 11,000 Fortinet devices that are exposed online and have FortiCloud SSO enabled. CISA has also added CVE-2025-59718 to its catalog of flaws exploited in attacks on December 16 and has ordered federal agencies to patch within a week. BleepingComputer reached out to Fortinet multiple times this week with questions about these FortiGate attacks, but the company has yet to reply. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.

Daily Brief Summary

VULNERABILITIES // Fortinet FortiGate Devices Face Exploitation Through SSO Vulnerability

Arctic Wolf reports a new campaign targeting Fortinet FortiGate devices, exploiting an unknown vulnerability in the single sign-on feature to create rogue accounts and steal firewall configurations.

The attacks began on January 15 and show similarities to previous incidents related to a critical authentication bypass vulnerability (CVE-2025-59718) in Fortinet products.

Attackers exploit the vulnerability via malicious SAML messages, allowing them to bypass authentication on vulnerable FortiGate firewalls when FortiCloud SSO is enabled.

Fortinet's latest FortiOS version (7.4.10) does not fully address the vulnerability, prompting plans for further updates (7.4.11, 7.6.6, and 8.0.0) to mitigate the issue.

Administrators are advised to disable FortiCloud SSO temporarily to prevent unauthorized access until a comprehensive patch is released.

Shadowserver is monitoring nearly 11,000 online Fortinet devices with FortiCloud SSO enabled, highlighting the potential scale of exposure.

CISA has added CVE-2025-59718 to its catalog of known exploited vulnerabilities, mandating federal agencies to apply patches within a week.