Hackers Exploit Fortinet SSO Auth Bypass to Gain Admin Access

Two critical authentication bypass vulnerabilities have been actively exploited in the threat protection solutions offered by Fortinet’s management infrastructure. These vulnerabilities, CVE-2025-59718 and CVE-2025-59719, have been exploited because there is an urgent need to hasten the issuance of fixes. The vulnerabilities have been used to provide attackers with admin access through the FortiCloud SSO functionality.

🔐 Fortinet FortiCloud SSO Vulnerabilities

Critical SAML Authentication Bypass Vulnerabilities

⚠️ IMPROPER CRYPTOGRAPHIC SIGNATURE VERIFICATION
CNA: Fortinet, Inc. ⚡ CVE-2025-59718 9.8 CRITICAL
An unauthenticated attacker may bypass FortiCloud SSO authentication via a forged SAML response.
🖥️ Affected Products
FortiOS 7.0.0 – 7.6.3
FortiProxy 7.0.0 – 7.6.3
FortiSwitchManager 7.0.0 – 7.2.6
CNA: Fortinet, Inc. ⚡ CVE-2025-59719 9.8 CRITICAL
An unauthenticated attacker may bypass FortiCloud SSO authentication via a forged SAML response.
🖥️ Affected Products
FortiWeb 8.0.0
FortiWeb 7.6.0 – 7.6.4
FortiWeb 7.4.0 – 7.4.9
🔴 Common Characteristics
🔓 Crypto Signature Failure
🎭 SAML Manipulation
⚠️ Auth Bypass
🚫 No Auth Required

Root Cause: Improper SAML Signature Verification

  • Core problem lies within wrong verification of cryptographic signatures
  • Flaw exists in the SAML authentication process
  • SAML employs identity exchange in cloud computing
  • Failures in signature validation will compromise the trust model
  • Device parses claims regarding possible identity
  • An attacker could forge SAML response messages
  • No private keys are needed in order to construct the response
  • SAML content is trusted by the device
  • Attacker posing as admin user
  • Full administrative access is granted on the basis of the forged claim
  • Bypassing Authentication happens prior to the password prompt

!
SAML Vulnerability Flow

Improper Cryptographic Signature Verification in Cloud Auth

🔓 Attack Flow

1 Flaw: Improper signature verification
2 Exploit: Attacker forges SAML response
3 Trust: Malicious content is trusted
4 Forgery: Attacker claims Admin ID
5 Access: Full admin access granted
🚨 CRITICAL: Authentication Bypassed

🔑 Security Issues

! Cryptographic Failure: Signature validation fails to verify authenticity.
! No Keys Required: Responses forged without stealing private keys.
! Pre-Auth Exploit: Attack succeeds before any password prompt.
! Privilege Escalation: Instant administrative access.
! Cloud Risk: Affects identity federation in cloud environments.

FortiCloud SSO as an Unintended Attack Surface

  • A critical vulnerability, scoring 9.1 or more on the CVSS scale
  • High Severity reflects easy exploitation
  • Attackers can acquire super-admin rights
  • Enabling changes to firewall rules and security logging disablement
  • The vulnerabilities are accessible through the public internet
  • Exposed Management Interfaces are Highly Vulnerable
  • The SSO feature of FortiCloud is disabled in the factory settings
  • Registering the device through GUI to FortiCare will enable FortiCloud SSO automatically
  • Feature is still enabled unless the SSO toggle is turned off manually

Immediate Mitigation and Patch Guidance

Numerous firms may also be exposed without their knowledge. Malicious login activity was recorded to have begun on December 12, 2025. Traffic has been traced to IP addresses that belong to Asia, the US, and Germany. More particularly, firms such as The Constant Company and Kaopu Cloud HK are often quoted. Attackers exploit login credentials to export device configurations. Organizations should, as a matter of priority, upgrade to a patched version as soon as possible:

Version Affected Solution
FortiOS 7.6 7.6.0 through 7.6.3 Upgrade to 7.6.4 or above
FortiOS 7.4 7.4.0 through 7.4.8 Upgrade to 7.4.9 or above
FortiOS 7.2 7.2.0 through 7.2.11 Upgrade to 7.2.12 or above
FortiOS 7.0 7.0.0 through 7.0.17 Upgrade to 7.0.18 or above
FortiOS 6.4 Not affected Not Applicable
FortiProxy 7.6 7.6.0 through 7.6.3 Upgrade to 7.6.4 or above
FortiProxy 7.4 7.4.0 through 7.4.10 Upgrade to 7.4.11 or above
FortiProxy 7.2 7.2.0 through 7.2.14 Upgrade to 7.2.15 or above
FortiProxy 7.0 7.0.0 through 7.0.21 Upgrade to 7.0.22 or above
FortiSwitchManager 7.2 7.2.0 through 7.2.6 Upgrade to 7.2.7 or above
FortiSwitchManager 7.0 7.0.0 through 7.0.5 Upgrade to 7.0.6 or above
FortiWeb 8.0 8.0.0 Upgrade to 8.0.1 or above
FortiWeb 7.6 7.6.0 through 7.6.4 Upgrade to 7.6.5 or above
FortiWeb 7.4 7.4.0 through 7.4.9 Upgrade to 7.4.10 or above
FortiWeb 7.2 Not affected Not Applicable
FortiWeb 7.0 Not affected Not Applicable

You are advised to upgrade to version Furthermore, you can reduce the risk by turning off the FortiCloud SSO function. To do this via the GUI, you must first go to System settings. Furthermore, you have to look for the slider labelled “Allow administrative login using FortiCloud SSO” and turn it OFF. In addition to that, you have to limit management access through the “Trusted Hosts” function. Thus, the attacker on the public internet cannot access the login page. Lastly, you have to reset all admin passwords if you spot IOCs.

Conclusion: When Authentication Fails, Perimeter Security Collapses

The Fortinet SSO authentication bypass exposes a hard truth about modern infrastructure security. When identity validation breaks, attackers do not need malware, exploits, or credentials. A forged SAML response is enough to gain full administrative control. In this case, the compromise happens before any password prompt appears, turning trusted management interfaces into open doors.

Once admin access is obtained, firewalls can be reconfigured, logging disabled, and defenses weakened silently. At that point, the security device itself becomes the attack platform.

Why This Risk Extends Beyond Fortinet

This incident is not just a Fortinet issue. It reflects a broader, systemic risk affecting many organizations today:

  • Authentication flaws expose management planes directly to the internet
  • Cloud connected features expand attack surface by default
  • Misconfigurations remain invisible without continuous assessment
  • Legacy devices run vulnerable firmware longer than expected
  • Admin access can be lost without triggering endpoint alerts

When trust is broken at the identity layer, traditional security controls offer little resistance.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top