CyberSecurityNews

Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild


An active intrusion is targeting critical authentication bypass vulnerabilities in Fortinet’s FortiGate appliances and related products.

Threat actors are exploiting CVE-2025-59718 and CVE-2025-59719 to perform unauthenticated single sign-on (SSO) logins via malicious SAML messages, granting attackers administrative access.

Fortinet disclosed the flaws in a PSIRT advisory on December 9, 2025. Arctic Wolf quickly followed with its own security bulletin, urging immediate patching.

The vulnerabilities affect multiple product lines, FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager, when FortiCloud SSO is enabled.

FortiCloud SSO login remains disabled by default in factory settings. However, it activates automatically during device registration via FortiCare GUI unless administrators explicitly disable the “Allow administrative login using FortiCloud SSO” option. This common oversight exposes internet-facing devices to remote exploitation.

Once enabled, attackers craft SAML assertions to bypass authentication entirely. Arctic Wolf reports intrusions originating from a limited set of IP addresses assigned to providers such as The Constant Company LLC and Kaopu Cloud HK Limited. These actors primarily target the default “admin” account.

google

IOCHosting Provider
45.32.153[.]218The Constant Company LLC
167.179.76[.]111The Constant Company LLC
199.247.7[.]82The Constant Company LLC
45.61.136[.]7Bl Networks
38.54.88[.]203Kaopu Cloud HK Limited
38.54.95[.]226Kaopu Cloud HK Limited
38.60.212[.]97Kaopu Cloud HK Limited

A sample log from a compromised FortiGate shows a successful SSO login:
date=2025-12-12 time=REDACTED ... logid="0100032001" ... user="admin" ui="sso(199.247.7[.]82)" method="sso" srcip=199.247.7[.]82 ... action="login" status="success" ...

Post-login, attackers exported device configurations via GUI from the same IPs, as evidenced by:
date=2025-12-12 time=REDACTED ... logid="0100032095" ... action="download" ... msg="System config file has been downloaded by user admin via GUI(199.247.7[.]82)"

Arctic Wolf’s managed detection and response (MDR) platform identifies these patterns and continues alerting affected customers.

Fortinet has released fixed versions across branches. Products like FortiOS 6.4, FortiWeb 7.0, and FortiWeb 7.2 remain unaffected.

ProductAffected VersionsFixed Version
FortiOS 7.67.6.0 – 7.6.37.6.4+
FortiOS 7.47.4.0 – 7.4.87.4.9+
FortiOS 7.27.2.0 – 7.2.117.2.12+
FortiOS 7.07.0.0 – 7.0.177.0.18+
FortiProxy 7.67.6.0 – 7.6.37.6.4+
FortiProxy 7.47.4.0 – 7.4.107.4.11+
FortiProxy 7.27.2.0 – 7.2.147.2.15+
FortiProxy 7.07.0.0 – 7.0.217.0.22+
FortiSwitchManager 7.27.2.0 – 7.2.67.2.7+
FortiSwitchManager 7.07.0.0 – 7.0.57.0.6+
FortiWeb 8.08.0.08.0.1+
FortiWeb 7.67.6.0 – 7.6.47.6.5+
FortiWeb 7.47.4.0 – 7.4.97.4.10+

If malicious logs appear, reset all firewall credentials immediately. Even hashed passwords in exported configs remain vulnerable to offline dictionary attacks on weak secrets.

Restrict management interfaces to trusted internal networks only. Arctic Wolf has tracked repeated campaigns hitting Fortinet and similar appliances, often via exposed search engines.

As a temporary workaround, disable FortiCloud SSO: Navigate to System > Settings and toggle “Allow administrative login using FortiCloud SSO” to Off, or run CLI:

textconfig system global
set admin-forticloud-sso-login disable
end

Organizations should prioritize upgrades amid rising firewall targeting. Arctic Wolf emphasizes vigilance, with ongoing detections in place.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link