Fortinet fixed two critical authentication-bypass vulnerabilities

Fortinet fixed two critical authentication-bypass vulnerabilities

Fortinet fixed two critical authentication-bypass vulnerabilities

Pierluigi Paganini
Fortinet fixed two critical authentication-bypass vulnerabilities December 10, 2025

Fortinet fixed two critical authentication-bypass vulnerabilities

Fortinet patched 18 flaws, including two authentication-bypass bugs affecting FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager with FortiCloud SSO enabled.

Fortinet addressed 18 vulnerabilities, including two authentication-bypass flaws, tracked as CVE-2025-59718 and CVE-2025-59719 (CVSS score of 9.1), affecting FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager when FortiCloud SSO is enabled.

Both vulnerabilities are improper verification of cryptographic signature issues.

An improper signature-verification flaw in FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager lets an unauthenticated attacker bypass FortiCloud SSO login using a crafted SAML message, if the feature is enabled. FortiCloud SSO is disabled by default, but it activates automatically during FortiCare registration unless the admin disables the “Allow administrative login using FortiCloud SSO” toggle.

“Please note that the FortiCloud SSO login feature is not enabled in default factory settings. However, when an administrator registers the device to FortiCare from the device’s GUI, unless the administrator disables the toggle switch “Allow administrative login using FortiCloud SSO” in the registration page, FortiCloud SSO login is enabled upon registration.” reads the advisory.

The vendor recommends disabling the FortiCloud login feature (if enabled) until upgrading to a non-affected version, as a temporary mitigation.

Below are the impacted versions:

Version Affected Solution
FortiOS 7.6 7.6.0 through 7.6.3 Upgrade to 7.6.4 or above
FortiOS 7.4 7.4.0 through 7.4.8 Upgrade to 7.4.9 or above
FortiOS 7.2 7.2.0 through 7.2.11 Upgrade to 7.2.12 or above
FortiOS 7.0 7.0.0 through 7.0.17 Upgrade to 7.0.18 or above
FortiOS 6.4 Not affected Not Applicable
FortiProxy 7.6 7.6.0 through 7.6.3 Upgrade to 7.6.4 or above
FortiProxy 7.4 7.4.0 through 7.4.10 Upgrade to 7.4.11 or above
FortiProxy 7.2 7.2.0 through 7.2.14 Upgrade to 7.2.15 or above
FortiProxy 7.0 7.0.0 through 7.0.21 Upgrade to 7.0.22 or above
FortiSwitchManager 7.2 7.2.0 through 7.2.6 Upgrade to 7.2.7 or above
FortiSwitchManager 7.0 7.0.0 through 7.0.5 Upgrade to 7.0.6 or above
FortiWeb 8.0 8.0.0 Upgrade to 8.0.1 or above
FortiWeb 7.6 7.6.0 through 7.6.4 Upgrade to 7.6.5 or above
FortiWeb 7.4 7.4.0 through 7.4.9 Upgrade to 7.4.10 or above
FortiWeb 7.2 Not affected Not Applicable
FortiWeb 7.0 Not affected Not Applicable

The vulnerabilities were internally discovered and reported by Yonghui Han and Theo Leleu of Fortinet Product Security team.

At this time, it is unclear if any of these vulnerabilities has been exploited in attacks in the wild.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, FortiOS)







Source link