A critical security situation is unfolding as threat actors are actively compromising Fortinet FortiGate firewalls, including devices that are fully patched against previously known vulnerabilities. According to a bulletin from Arctic Wolf, a new campaign starting around January 15, 2026, is exploiting a new attack path to bypass SAML single sign-on (SSO) authentication. Successful exploitation grants attackers administrative access, allowing them to create rogue admin accounts for persistence, modify firewall policies, and exfiltrate device configurations. While the activity is similar to attacks exploiting CVE-2025-59718 and CVE-2025-59719, Fortinet has reportedly confirmed this is a new, distinct vector affecting its SAML SSO implementations. This poses a severe risk to organizations relying on FortiGate devices for network security.
This appears to be a new, zero-day or n-day vulnerability in the SAML SSO implementation of FortiOS, the operating system for FortiGate firewalls. It allows an attacker to bypass authentication and gain administrative privileges.
CVE-2025-59718, CVE-2025-59719 (The new attack path is distinct but related).Active exploitation has been observed in the wild since at least January 15, 2026. The activity is described as automated, suggesting that threat actors have developed reliable tooling to scan for and exploit vulnerable firewalls at scale. The malicious SSO logins have been traced back to a small number of hosting providers.
The core of the vulnerability lies in how the FortiGate appliance validates SAML assertions during the SSO login process. A flaw allows an attacker to craft a request that tricks the firewall into granting an authenticated session without proper validation from the Identity Provider (IdP).
T1190 - Exploit Public-Facing Applicationfortinet-tech, admin-tech) to ensure persistent access even if the SSO path is fixed. T1136.001 - Create Account: Local AccountT1005 - Data from Local SystemThe compromise of a perimeter firewall is one of the most critical security incidents an organization can face.
| Type | Value | Description |
|---|---|---|
| log_source | FortiGate Event Logs (System) | Look for the creation of new local administrator accounts, especially with non-standard names like 'fortinet-tech' or 'admin-tech'. |
| log_source | FortiGate Event Logs (System) | Monitor for successful SAML logins from unexpected IP addresses or Identity Providers. |
| process_name | sslvpnd |
The SSL VPN daemon process. Monitor for crashes or anomalous behavior. |
| command_line_pattern | diagnose debug |
Attackers may use diagnostic commands to gather information after compromise. Monitor for their use outside of normal troubleshooting windows. |
D3-DAM: Domain Account Monitoring (applied here to appliance accounts) to baseline and detect new account creation.D3-SU: Software Update.Apply the emergency patch from Fortinet as soon as it becomes available.
Temporarily disable SAML SSO on the management interface as a compensating control.
Restrict access to the firewall's management interface to a limited set of trusted IP addresses.
As an immediate compensating control, organizations using FortiGate firewalls should disable SAML SSO for the administrative management interface until a definitive patch is released and deployed. Revert to a local administrator login protected by phishing-resistant multi-factor authentication (MFA) like a FIDO2 hardware key. Furthermore, harden the management interface by restricting access via a 'local-in' policy to only allow connections from a dedicated, secure management subnet or a specific set of trusted administrative IP addresses. This action directly removes the vulnerable attack surface (the SAML SSO login page) from exposure, preventing exploitation of this specific authentication bypass vector.
Immediately implement continuous monitoring and alerting for the creation of new local administrator accounts on all FortiGate devices. Since a key attacker TTP is to create a persistent local account like 'fortinet-tech', this is a high-fidelity indicator of compromise. Configure your SIEM or log management platform to ingest FortiGate system event logs and trigger a critical alert upon detection of an event ID corresponding to new admin account creation. The alert should trigger an immediate incident response playbook to verify the change, and if unauthorized, to isolate the device, remove the rogue account, and begin a full compromise investigation. This provides a crucial detection tripwire for this specific attack chain.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats