CyberSecurityNews

Fortinet Confirms Active Exploitation of FortiCloud SSO Authentication Bypass Vulnerability


Fortinet confirms active exploitation of a FortiCloud SSO authentication bypass vulnerability, with a new automated campaign targeting even fully patched FortiGate devices.

Cybersecurity firm Arctic Wolf first observed the attacks on January 15, 2026, involving rapid configuration exfiltration and persistence via generic admin accounts.

In December 2025, Fortinet disclosed two critical vulnerabilities, CVE-2025-59718 and CVE-2025-59719 (FG-IR-25-647), enabling unauthenticated attackers to bypass SSO authentication using crafted SAML messages when FortiCloud SSO is enabled.

These flaws affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager, allowing admin access without credentials. Patches were issued, but recent incidents on updated firmware like 7.4.10 indicate a persistent or variant issue applicable to all SAML SSO implementations.

Affected Versions

Fortinet’s PSIRT advisory details vulnerable versions and fixes.

ProductAffected VersionsSolution
FortiOS 7.67.6.0 through 7.6.37.6.4 or above
FortiOS 7.47.4.0 through 7.4.87.4.9 or above
FortiOS 7.27.2.0 through 7.2.117.2.12 or above
FortiProxy 7.27.2.0 through 7.2.147.2.15 or above
FortiSwitchManager 7.27.2.0 through 7.2.67.2.7 or above

Reports confirm exploitation on 7.4.9, 7.4.10, and 7.6.x, with fixes scheduled for later releases.

google

Attack Campaign Details

Arctic Wolf telemetry reveals highly automated attacks mirroring December 2025 activity. Threat actors use malicious SSO logins (e.g., cloud-init@mail.io), exfiltrate configs via GUI for offline credential cracking, then create persistence accounts granting VPN access.

Incidents occur seconds apart, targeting internet-exposed devices; over 25,000 had SSO enabled per prior scans. Field Effect notes compromises on the latest FortiOS despite patches.

Combined IOCs from Fortinet, Arctic Wolf, and reports.

TypeIOCContext
User Accountcloud-noc@mail[.]ioSSO login
User Accountcloud-init@mail[.]ioSSO login, config exfil
IP Address104.28.244[.]115Cloudflare IP
IP Address104.28.212[.]114Intrusions
IP Address37.1.209[.]19Third-party observed
IP Address217.119.139[.]50Intrusions
Persistence Acctaudit, backup, itadminLocal admin creation
Persistence Acctsecadmin, supportLocal admin creation
Persistence Acctremoteadmin, helpdeskLocal admin creation

Search logs for SSO successes from these IPs/users and “Add system.admin” events.

Fortinet urges disabling FortiCloud SSO:

textconfig system global
set admin-forticloud-sso-login disable
end

Implement local-in policies to restrict admin access:

textconfig firewall local-in-policy
edit 1
set intf "port1"
set srcaddr "10.10.10.0" # Trusted subnet
set dstaddr "all"
set service "HTTPS"
set schedule "always"
next
end

Treat compromised devices as fully owned: upgrade to the latest firmware (e.g., 7.6.x), restore clean configs, rotate all credentials, including LDAP/AD, and audit VPN settings.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link