Fortinet Warns of Critical FortiCloud SSO Authentication Bypass Flaws
Fortinet releases patches for two critical 9.1 CVSS authentication bypass vulnerabilities affecting FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.
Fortinet has issued urgent security updates addressing two critical authentication bypass vulnerabilities (CVSS 9.1) that could allow attackers to bypass FortiCloud SSO login on FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager devices. Given Fortinet's history as a frequent target for ransomware gangs and nation-state hackers, administrators should prioritize these patches immediately.
The Vulnerabilities
CVE-2025-59718 (CVSS 9.1 - Critical)
CVE-2025-59719 (CVSS 9.1 - Critical)
Both flaws stem from improper verification of cryptographic signatures, allowing attackers to forge authentication via malicious SAML messages.
The Silver Lining: Not Enabled by Default
Fortinet notes that FortiCloud SSO login is not enabled in default factory settings. However, there's an important caveat:
"When an administrator registers the device to FortiCare from the device's GUI, unless the administrator disables the toggle switch 'Allow administrative login using FortiCloud SSO' in the registration page, FortiCloud SSO login is enabled upon registration."
Translation: If you've registered your Fortinet device through the GUI without explicitly disabling FortiCloud SSO, you're likely vulnerable.
Immediate Mitigation Steps
Fortinet advises disabling FortiCloud SSO login until you can upgrade to a patched version:
Via GUI:
Via CLI:
config system global
set admin-forticloud-sso-login disable
end
Additional Vulnerabilities Patched
Fortinet's December security update also addresses:
CVE-2025-59808 - Unverified Password Change
CVE-2025-64471 - Pass-the-Hash Authentication
Why Fortinet Vulnerabilities Matter
Fortinet devices are high-value targets for attackers because they sit at the network perimeter—compromising a firewall or VPN gateway often means compromising the entire network.
Recent Fortinet Exploitation History
The Volt Typhoon incident is particularly notable: the Chinese state-sponsored hacking group used FortiOS vulnerabilities to backdoor a Dutch Ministry of Defence military network, deploying custom 'Coathanger' RAT malware for persistent access.
Who's at Risk?
Check if you're affected:
If you answered yes to all three, you should treat this as a critical priority.
Organizations most at risk:
Fortinet's Track Record
This isn't an isolated incident. Fortinet vulnerabilities have become a favorite for:
Ransomware Groups:
Nation-State APTs:
The Pattern:
Action Items
Immediate (Today):
Short-Term (This Week):
Ongoing:
Related Security News
This disclosure comes during a busy week for security patches. Microsoft's December 2025 Patch Tuesday also addressed critical vulnerabilities including an actively exploited Windows zero-day.
Conclusion
With a 9.1 CVSS score and Fortinet's history as a prime target for sophisticated attackers, these authentication bypass flaws demand immediate attention. The mitigation is straightforward—disable FortiCloud SSO login until you can patch—so there's no excuse for delay.
Don't wait for the inevitable mass exploitation. Patch now.