Patch now! Attackers bypass authentication in Fortinet products

Currently, attackers are exploiting an SSO vulnerability in certain Fortinet products. Security patches are available.

listen Print view
Warning message on screen

(Image: Gorodenkoff/Shutterstock.com)

2 min. read

If SSO login is enabled in FortiOS, FortiProxy, FortiSwitchManager, and FortiWeb, systems are vulnerable. Currently, attackers are exploiting two “critical” vulnerabilities in this context and attacking PCs.

By default, authentication via SSO is not active. Admins should quickly check if they are using SSO. If so, they should install the security updates available for a few days. If this is not done, attackers will exploit the vulnerabilities with prepared SAML messages (CVE-2025-59718, CVE-2025-59719), bypass authentication, and gain access to appliances.

Fortinet lists the vulnerable versions and the security updates in a warning message. FortiOS 6.4, FortiWeb 7.0, and 7.2 are not affected by the vulnerabilities. If an installation is not immediately possible, admins must temporarily disable SSO login to protect systems. This can be done via the command-line interface with these commands:

config system global

set admin-forticloud-sso-login disable

end

Security researchers from Arctic Wolf are warning about the attacks in a post. The extent to which the attacks are occurring is currently unknown. In their post, the security researchers list various parameters such as IP addresses where admins can identify already attacked instances.

Videos by heise

If attacks have occurred, admins should reset all access credentials in addition to installing the patch. What attackers specifically do after a successful attack is currently unknown. In general, external access should be regulated via firewall rules and VPN tunnels.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.