• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fortinet confirms active forticloud sso bypass on fully patched fortigate

Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

You are here: Home / General Cyber Security News / Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
January 23, 2026

Fortinet has officially confirmed that it’s working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh exploitation activity on fully-patched firewalls.

“In the last 24 hours, we have identified a number of cases where the exploit was to a device that had been fully upgraded to the latest release at the time of the attack, which suggested a new attack path,” Fortinet Chief Information Security Officer (CISO) Carl Windsor said in a Thursday post.

The activity essentially mounts to a bypass for patches put in place by the network security vendor to address CVE-2025-59718 and CVE-2025-59719, which could allow unauthenticated bypass of SSO login authentication via crafted SAML messages if the FortiCloud SSO feature is enabled on affected devices. The issues were originally addressed by Fortinet last month.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


However, earlier this week, reports emerged of renewed activity in which malicious SSO logins on FortiGate appliances were recorded against the admin account on devices that had been patched against the twin vulnerabilities. The activity is similar to incidents observed in December, shortly after the disclosure of the CVE-2025-59718 and CVE-2025-59719.

Cybersecurity

The activity involves the creation of generic accounts for persistence, making configuration changes granting VPN access to those accounts, and the exfiltration of firewall configurations to different IP addresses. The threat actor has been observed logging in with accounts named “[email protected]” and “[email protected].”

As mitigations, the company is urging the following actions –

  • Restrict administrative access of edge network device via the internet by applying a local-in policy
  • Disable FortiCloud SSO logins by disabling “admin-forticloud-sso-login”

“It is important to note that while, at this time, only exploitation of FortiCloud SSO has been observed, this issue is applicable to all SAML SSO implementations,” Fortinet said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «tiktok forms u.s. joint venture to continue operations under 2025 TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
  • TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order
  • Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack
  • Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
  • ThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories
  • Filling the Most Common Gaps in Google Workspace Security
  • Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts
  • SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release

Copyright © TheCyberSecurity.News, All Rights Reserved.