Act now! Attackers apparently bypass Fortinet security patch

According to media reports, a security patch for various Fortinet products is defective. However, admins can still protect instances.

listen Print view
Warning triangle

(Image: Sashkin / Shutterstock.com)

2 min. read

There are currently indications that attackers are bypassing a recently released security update and attacking FortiOS, FortiProxy, FortiSwitchManager, and FortiWeb. The vulnerability is considered “critical”.

The IT news website Bleepingcomputer reports on Fortinet customers whose Fortinet products are being successfully attacked by attackers despite the installed security patch. The vulnerability (CVE-2025-59718) has been known since December of last year. Security updates were also released at that time.

Since then, attacks have been ongoing, and attackers are actively exploiting the vulnerability. Afterward, they gain access to devices. The extent of the attacks is currently unclear. In a post, security researchers from Arctic Wolf list, among other things, parameters that admins can use to identify already attacked devices.

Videos by heise

However, instances are only vulnerable if authentication via SSO is active. This is not the case by default. Since Fortinet has not yet released a repaired security update at this time, admins must act now and disable login via SSO. This can be done via the command-line interface with the following commands:

config system global

set admin-forticloud-sso-login disable

end

In a warning message, Fortinet lists further information on the affected products. FortiWeb 7.0 and 7.2 are reportedly not affected by the vulnerability. Security researchers from Shadowserver have scanned the internet for SSO instances. They currently count more than 11,000 worldwide. In Germany, there are just over 120 instances.

In addition, attackers are currently targeting FortiSIEM and exploiting a “critical” security vulnerability (CVE-2025-64155).

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.