top of page

Fortinet Authentication Bypass (CVE-2025-59718/19)

Fortinet Authentication Bypass (CVE-2025-59718/19) – Patched Devices Remain Vulnerable.

Category: Technical Reports / Cybersecurity / CVE Analysis Date: January 23, 2026

A realistic cybersecurity visual featuring a FortiGate firewall in the foreground with security logs and a global lock backdrop, highlighting two critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719). Designed to support an awareness post about SSO/SAML auth-bypass risk, potential unauthorized admin access, and the urgency of patching and restricting management exposure.
critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719). Designed to support an awareness post about SSO/SAML auth-bypass risk, potential unauthorized admin access, and the urgency of patching and restricting management exposure.

Executive Summary: The "Patch" Is Not Enough

URGENT UPDATE (Jan 23, 2026): Security researchers and Fortinet have confirmed that applying the December 2025 patches may not fully mitigate the risk of the recent critical authentication bypass vulnerabilities. Fully patched devices are still being compromised via new attack vectors related to the SAML Single Sign-On (SSO) mechanism.

If you manage FortiGate, FortiWeb, FortiProxy, or FortiSwitchManager, relying solely on firmware updates is currently insufficient. Immediate configuration changes are required to secure your perimeter.


The Vulnerability: Zero-Auth Administrative Access

Two critical vulnerabilities (CVE-2025-59718 and CVE-2025-59719) with a CVSS score of 9.8 (Critical) are actively being exploited in the wild.

The flaw allows an unauthenticated attacker to manipulate SAML assertions used by the FortiCloud Single Sign-On feature. By forging these messages, an attacker can bypass authentication entirely and log in as a "Super Admin" without ever needing a valid username or password.

Potential Impact:

  • Full device takeover.

  • Exfiltration of configuration files (including hashed passwords and VPN secrets).

  • Creation of persistent backdoor accounts (e.g., users named support, secadmin, backup).

  • Lateral movement into the internal network.


Why You Might Be Vulnerable Without Knowing It

A critical detail often missed is the auto-enablement of the vulnerable feature. While admin-forticloud-sso-login is disabled by default in factory settings, it is automatically enabled the moment a device is registered to FortiCare via the GUI.

Unless your team explicitly disabled this feature post-registration, your internet-facing management interfaces are likely exposed.

Affected Product Matrix:

  • FortiOS (FortiGate): Versions 7.6.x, 7.4.x, 7.2.x, and 7.0.x.

  • FortiWeb: Versions 8.0.0, 7.6.x, and 7.4.x.

  • FortiProxy & FortiSwitchManager: Multiple versions.


Immediate Mitigation Strategy (Runbook)

Due to reports of patched devices being compromised, Floripi Solutions strongly recommends the following defense-in-depth actions immediately.

1. Disable FortiCloud SSO (Critical Workaround)

Do not wait for a new patch. Disable the vulnerable feature via the Command Line Interface (CLI) immediately:

Bash

config system global
    set admin-forticloud-sso-login disable
end

2. Restrict Management Access

Your management interfaces (HTTPS/SSH) should never be exposed to the public internet.

  • Implement a Local-in Policy to restrict administrative access to trusted internal IP addresses or Management VPNs only.

  • Audit your trusted host configurations.


3. Threat Hunting: Check for Compromise

If your device was exposed, assume breach until proven otherwise. Audit your logs for:

  • Suspicious Usernames: Look for logins from emails like cloud-noc@mail.io or cloud-init@mail.io.

  • Event Pattern: Admin login successful with method="sso" followed immediately by a configuration download.

  • New Accounts: Check for recently created local administrators that your team did not authorize.


Conclusion

This incident serves as a stark reminder that edge security devices require constant vigilance. The "set it and forget it" approach to network security is no longer viable in 2026.

Need Assistance? If you require support with emergency hardening, log analysis, or vulnerability assessment, the Floripi Technical Team is ready to assist.

Comments


bottom of page