Fortinet has issued a critical warning confirming the active exploitation of an authentication bypass vulnerability in its FortiCloud Single Sign-On (SSO) feature. The vulnerabilities, tracked as CVE-2025-59718 and CVE-2025-59719, allow attackers to gain unauthorized administrative access to FortiGate firewalls. Alarmingly, the attacks have been observed on fully patched devices, suggesting a logic flaw or a zero-day exploit chain. Attackers are leveraging the bypass to create rogue administrative accounts, enable remote access VPNs, and exfiltrate device configurations, posing a severe risk to affected organizations.
Fortinet has confirmed active in-the-wild exploitation. The fact that attackers are targeting even fully patched systems suggests a sophisticated threat actor is involved. The post-exploitation activity indicates a clear goal: establish long-term persistence and gain deep insight into the victim's network architecture.
Post-Exploitation TTPs:
T1136.001 - Local Account).T1133 - External Remote Services).This is a critical-level threat. A compromised perimeter firewall is one of the worst-case security scenarios.
Administrators must proactively hunt for these indicators:
| Type | Value | Description |
|---|---|---|
| Log Source | FortiGate System Event Logs | Look for unexpected creation of new local administrator accounts. |
| Log Source | FortiGate VPN Logs | Monitor for successful VPN connections from unknown IP addresses or associated with newly created accounts. |
| Log Source | FortiGate System Event Logs | Search for events related to configuration downloads or backups initiated by suspicious accounts or at unusual times. |
| Command Line Pattern | diagnose system session list |
On the FortiGate CLI, check for active administrative sessions from unexpected source IPs. |
Authentication Event Thresholding.Fortinet customers should take immediate action:
Multi-factor Authentication.Fortinet disclosed and patched CVE-2026-24858, a critical FortiCloud SSO bypass actively exploited to hijack devices, bypassing previous patches. CISA added it to KEV.
Regularly audit firewall configurations and local administrative accounts for any unauthorized changes or additions.
Enforce MFA on all administrative accounts as a critical compensating control against authentication bypasses.
Mapped D3FEND Techniques:
Restrict access to the firewall's management interface to a limited set of trusted IP addresses (a 'management VLAN').
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats