PT-2025-50118 · Fortinet · Fortios+2
Published
2025-12-09
·
Updated
2026-03-03
·
CVE-2025-59718
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiOS versions 7.0.0 through 7.6.3
Fortinet FortiProxy versions 7.0.0 through 7.6.3
Fortinet FortiSwitchManager versions 7.0.0 through 7.2.6
Fortinet FortiWeb (affected versions not specified)
Description
A cryptographic signature verification issue exists in Fortinet products, allowing an unauthenticated attacker to bypass FortiCloud SSO login authentication via a crafted SAML response message. This vulnerability is actively exploited, with attackers creating unauthorized administrator accounts and potentially stealing configuration data. Reports indicate that exploitation continues even on systems with applied patches, suggesting a patch bypass. The vulnerability is being exploited by the Mozi botnet and Emotet campaigns. Approximately 200,000 FortiGate 7.x admin GUIs are exposed, with around 7% having FortiCloud SSO enabled for admin login. The exploitation involves sending crafted SAML messages to gain administrative access.
Recommendations
Fortinet FortiOS versions prior to 7.7.0: Disable FortiCloud SSO admin login.
Fortinet FortiProxy versions prior to 7.7.0: Disable FortiCloud SSO admin login.
Fortinet FortiSwitchManager versions prior to 7.3.0: Disable FortiCloud SSO admin login.
Fortinet FortiWeb: Restrict admin access.
Audit logs for new admin account creation and sudden configuration changes.
Rotate administrative credentials.
Upgrade firmware when a permanent fix is available.
Fix
RCE
LPE
Improper Verification of Cryptographic Signature
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2025-15540
CVE-2025-59718
Affected Products
Fortios
Fortiproxy
Fortiswitchmanager
References · 226
- https://nvd.nist.gov/vuln/detail/CVE-2025-59718 · Security Note
- https://bdu.fstec.ru/vul/2025-15540 · Security Note
- https://docs.fortinet.com/upgrade-tool/fortigate · Security Note
- https://twitter.com/SecureComputer0/status/2001562151912378482 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1ps41pv/top_10_trending_cves_21122025 · Reddit Post
- https://twitter.com/blackorbird/status/2014539249820041232 · Twitter Post
- https://t.me/true_secator/7736 · Telegram Post
- https://twitter.com/dailytechonx/status/2014409004785557934 · Twitter Post
- https://twitter.com/moton/status/2001411224479670696 · Twitter Post
- https://t.me/CSIRT_italia/3085 · Telegram Post
- https://reddit.com/r/msp/comments/1popgqs/yet_another_critical_fortinet_cve_sso_login · Reddit Post
- https://twitter.com/NCIIPC/status/1998708882861166790 · Twitter Post
- https://twitter.com/GuardingPearSof/status/2014244826577797304 · Twitter Post
- https://twitter.com/404LABSx/status/2001609440156361033 · Twitter Post
- https://twitter.com/lsof/status/2014399240101830704 · Twitter Post