Close Menu
geekfence.comgeekfence.com
    What's Hot

    M&A Monthly: February/March 2026

    March 7, 2026

    Posit AI Blog: luz 0.4.0

    March 7, 2026

    Top Reasons to Choose Precisely for SAP and Salesforce Process Automation

    March 7, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Fortinet confirms critical FortiCloud auth bypass not fully patched
    Cyber Security

    Fortinet confirms critical FortiCloud auth bypass not fully patched

    AdminBy AdminJanuary 23, 2026No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Fortinet confirms critical FortiCloud auth bypass not fully patched
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Fortinet confirms critical FortiCloud auth bypass not fully patched

    Days after admins began reporting that their fully patched firewalls are being hacked, Fortinet confirmed it’s working to fully address a critical FortiCloud SSO authentication bypass vulnerability that should have already been patched since early December.

    This comes after a wave of reports from Fortinet customers about threat actors exploiting a patch bypass for the CVE-2025-59718 vulnerability to compromise fully patched firewalls.

    Cybersecurity company Arctic Wolf said on Wednesday that the campaign began on January 15, with attackers creating accounts with VPN access and stealing firewall configurations within seconds, in what appear to be automated attacks. It also added that the attacks are very similar to incidents it documented in December, following the disclosure of the CVE-2025-59718 critical vulnerability in Fortinet products.

    Wiz

    On Thursday, Fortinet finally confirmed these reports, stating that ongoing CVE-2025-59718 attacks match December’s malicious activity and that it’s now working to fully patch the flaw.

    Affected Fortinet customers have also shared logs showing that the attackers created admin users after an SSO login from cloud-init@mail.io on IP address 104.28.244.114, which match indicators of compromise detected by Arctic Wolf while analyzing ongoing FortiGate attacks and December in-the-wild exploitation, as well as those shared by Fortinet on Thursday.

    “Recently, a small number of customers reported unexpected login activity occurring on their devices, which appeared very similar to the previous issue. However, in the last 24 hours, we have identified a number of cases where the exploit was to a device that had been fully upgraded to the latest release at the time of the attack, which suggested a new attack path,” said Fortinet Chief Information Security Officer (CISO) Carl Windsor.

    “Fortinet product security has identified the issue, and the company is working on a fix to remediate this occurrence. An advisory will be issued as the fix scope and timeline is available. It is important to note that while, at this time, only exploitation of FortiCloud SSO has been observed, this issue is applicable to all SAML SSO implementations.”

    Fortinet: Restrict admin access, disable FortiCloud SSO

    Until Fortinet fully addresses the CVE-2025-59718 vulnerability, Windsor advised customers to restrict administrative access to their edge network devices via the Internet by applying a local-in policy that limits the IP addresses that can access the devices’ administrative interfaces.

    Admins should also disable the FortiCloud SSO feature on their Fortinet devices by going into System -> Settings -> Switch and toggling off the “Allow administrative login using FortiCloud SSO” option.

    Fortinet customers who detect any of the IOCs while checking their devices for post-exploitation evidence are advised to treat “the system and configuration as compromised,” rotate credentials (including any LDAP/AD accounts), and restore their configuration with a known clean version.

    Internet security watchdog Shadowserver now tracks nearly 11,000 Fortinet devices exposed online that have FortiCloud SSO enabled. CISA also added CVE-2025-59718 to its list of actively exploited vulnerabilities on December 16 and ordered federal agencies to patch within a week.

    BleepingComputer reached out to Fortinet several times this week with questions about these ongoing attacks, but the company has yet to respond.


    Wiz

    As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

    This free cheat sheet outlines 7 best practices you can start using today.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    What cybersecurity actually does for your business

    March 7, 2026

    Hackers Used New Exploit Kit to Compromise Thousands of iPhones

    March 6, 2026

    February 2026 – Month of Smart Connections

    March 5, 2026

    They seized $4.8m in crypto… then gave the master key to the internet

    March 4, 2026

    Cultivating a robust and efficient quantum-safe HTTPS

    March 3, 2026

    Anthropic confirms Claude is down in a worldwide outage

    March 2, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202619 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202518 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 202610 Views
    Don't Miss

    M&A Monthly: February/March 2026

    March 7, 2026

    Fresh from TeleGeography’s GlobalComms team is this month’s edition of M&A Monthly—your intelligence report on…

    Posit AI Blog: luz 0.4.0

    March 7, 2026

    Top Reasons to Choose Precisely for SAP and Salesforce Process Automation

    March 7, 2026

    Introducing OpenClaw on Amazon Lightsail to run your autonomous private AI agents

    March 7, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    M&A Monthly: February/March 2026

    March 7, 2026

    Posit AI Blog: luz 0.4.0

    March 7, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.