PT-2025-50118 · Fortinet · Fortiswitchmanager +2
Published
2025-12-09
·
Updated
2026-02-03
·
CVE-2025-59718
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiOS versions 7.0.0 through 7.6.3
Fortinet FortiProxy versions 7.0.0 through 7.6.3
Fortinet FortiSwitchManager versions 7.0.0 through 7.2.6
Fortinet FortiWeb (affected versions not specified)
Description
A cryptographic signature verification issue exists in Fortinet products, allowing an unauthenticated attacker to bypass FortiCloud SSO login authentication via a crafted SAML response message. This vulnerability is actively exploited, with attackers creating unauthorized admin accounts and stealing configurations, even on fully patched systems. Automated attacks are observed, and the vulnerability persists despite previous patches. The exploitation of this flaw can lead to full administrative access, VPN access, and the exfiltration of sensitive data. Approximately 200,000 FortiGate 7.x admin GUIs are exposed, with around 7% having FortiCloud SSO enabled for admin login. The vulnerability is being exploited by the Mozi botnet and Emotet campaigns. The API endpoint used for authentication is not explicitly mentioned.
Recommendations
Fortinet FortiOS versions prior to 7.7.0: Disable FortiCloud SSO admin login.
Fortinet FortiProxy versions prior to 7.7.0: Disable FortiCloud SSO admin login.
Fortinet FortiSwitchManager versions prior to 7.3.0: Disable FortiCloud SSO admin login.
Restrict administrative access to the affected devices.
Audit logs for new admin account creation and unusual configuration changes.
Rotate administrative credentials.
Disable the vulnerable FortiCloud SSO feature if possible.
Fix
LPE
RCE
Improper Verification of Cryptographic Signature
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-15540
CVE-2025-59718
Affected Products
Fortios
Fortiproxy
Fortiswitchmanager
References · 224
- https://fortiguard.fortinet.com/psirt/FG-IR-25-647 · Security Note, Vendor Advisory
- https://bdu.fstec.ru/vul/2025-15540 · Security Note
- https://docs.fortinet.com/upgrade-tool/fortigate · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-59718 · Security Note
- https://twitter.com/ReliaQuestTR/status/2017311095111786958 · Twitter Post
- https://twitter.com/catnap707/status/2014092677306851829 · Twitter Post
- https://twitter.com/ThreatSynop/status/2015788870395150467 · Twitter Post
- https://twitter.com/kevnowledgy/status/2016622657584644119 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2015243265449107699 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1prbuxh/top_10_trending_cves_20122025 · Reddit Post
- https://t.me/EchelonEyes/4305 · Telegram Post
- https://twitter.com/kernyx64/status/1998618701717721480 · Twitter Post
- https://twitter.com/ThreatSynop/status/2014079747723018445 · Twitter Post
- https://twitter.com/Node39_/status/2001662960931082251 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2015107396150939661 · Twitter Post