The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning by adding CVE-2025-59718, a critical vulnerability in Fortinet products, to its Known Exploited Vulnerabilities (KEV) catalog. This action confirms that the vulnerability is being actively exploited in the wild. The flaw, which has a CVSS score of 9.1, is an improper cryptographic signature verification that allows an unauthenticated attacker to bypass FortiCloud single sign-on (SSO) and gain administrative access to affected devices. Products impacted include FortiOS, FortiProxy, and FortiWeb. Attackers have been observed exploiting this flaw to export device configurations, which can contain sensitive information like hashed credentials. CISA has set a patching deadline of December 23, 2025, for federal agencies and strongly urges all organizations using the affected products to patch immediately or apply the recommended mitigation.
CVE-2025-59718 is an improper verification of a cryptographic signature vulnerability. When FortiCloud SSO is enabled on an affected Fortinet appliance, an unauthenticated remote attacker can send a specially crafted SAML (Security Assertion Markup Language) message to the device. The device fails to properly validate the signature of this message, allowing the attacker to bypass the authentication process and gain administrative access.
The attack is particularly dangerous because it requires no authentication and no user interaction, making it easy for attackers to automate and scale. A related vulnerability, CVE-2025-59719, addresses the same underlying issue and is patched concurrently.
The vulnerability affects multiple Fortinet products where the FortiCloud SSO feature is enabled. It is important to note that while this feature is not enabled by default, it can be automatically activated when an administrator registers a device to FortiCare.
Organizations must consult the official Fortinet security advisory (FG-IR-25-329) for the specific list of vulnerable versions and apply the appropriate patches.
According to CISA and security firm Arctic Wolf, CVE-2025-59718 is under active exploitation. Malicious activity was observed starting on December 12, 2025, just days after Fortinet released the patches. Threat actors are known to be exploiting the vulnerability to gain initial access to target networks. Post-exploitation activity includes exporting the device configuration. This is a significant step, as the configuration file can contain hashed user passwords and other sensitive network information, which attackers can take offline to crack and use for further compromise and lateral movement.
A successful exploit of CVE-2025-59718 grants an attacker administrative access to a critical network security appliance. The business impact is severe:
config system admin/set forticloud-sso-login) is enabled. If it is, the device is potentially vulnerable and should be treated with high priority.config system admin
edit <admin-user>
set forticloud-sso-login disable
next
end
This is a form of D3FEND Application Configuration Hardening (D3-ACH).Fortinet SSO flaws (CVE-2025-59718, CVE-2025-59719) now rated CVSS 9.8, allowing full auth bypass. International agencies, including Australia and Pakistan, issue urgent patching alerts.
New technical analysis, MITRE ATT&CK mappings, and detailed cyber observables for detection of CVE-2025-59718 provided, following the federal agency patch deadline.
Applying the vendor-supplied patches is the most effective way to remediate the vulnerability.
Mapped D3FEND Techniques:
Disabling the vulnerable FortiCloud SSO feature serves as a critical workaround if patching is not immediately feasible.
Given that CVE-2025-59718 is under active exploitation and listed in the CISA KEV catalog, the highest priority action is to apply the patches provided by Fortinet immediately. This is an emergency change. Organizations should use their asset management and vulnerability scanning tools to identify all affected Fortinet appliances (FortiOS, FortiProxy, FortiWeb) in their environment. Prioritize patching for internet-facing devices first, as they are the most likely targets. After patching, verify the update was successful by checking the firmware version on each device. Because this flaw allows for a full authentication bypass, delaying patches exposes the network perimeter to a trivial compromise.
If immediate patching is not possible, the recommended workaround of disabling the FortiCloud SSO feature must be implemented. This is a critical compensating control that directly hardens the device against this specific attack vector. Administrators should connect to the CLI of each potentially vulnerable Fortinet device and run the command to disable forticloud-sso-login for all admin users. This action removes the vulnerable attack surface. This should be treated as a temporary measure, and a plan to patch the devices must still be pursued. This hardening action is a clear example of reducing the attack surface by disabling non-essential or vulnerable features, a core tenet of security best practices.
For detection and post-remediation hunting, organizations must implement rigorous Local Account Monitoring on their Fortinet devices. All authentication logs from Fortinet appliances should be forwarded to a central SIEM. Create specific detection rules to alert on any successful login using the 'forticloud-sso-login' method, especially if it originates from an untrusted or unexpected IP address. Correlate these login events with subsequent actions, such as a configuration backup or modification of firewall rules. An alert that fires on 'Successful FortiCloud SSO Login from Anomalous IP' followed by 'Admin User Exports Configuration' would be a high-fidelity indicator of compromise related to this specific threat. This allows security teams to detect exploitation attempts and investigate potential breaches that occurred before patching.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats