A critical security situation is unfolding as threat actors are actively compromising Fortinet FortiGate firewalls, including devices that are fully patched against previously known vulnerabilities. According to a bulletin from Arctic Wolf, a new campaign starting around January 15, 2026, is exploiting a new attack path to bypass SAML single sign-on (SSO) authentication. Successful exploitation grants attackers administrative access, allowing them to create rogue admin accounts for persistence, modify firewall policies, and exfiltrate device configurations. While the activity is similar to attacks exploiting CVE-2025-59718 and CVE-2025-59719, Fortinet has reportedly confirmed this is a new, distinct vector affecting its SAML SSO implementations. This poses a severe risk to organizations relying on FortiGate devices for network security.
This appears to be a new, zero-day or n-day vulnerability in the SAML SSO implementation of FortiOS, the operating system for FortiGate firewalls. It allows an attacker to bypass authentication and gain administrative privileges.
CVE-2025-59718, CVE-2025-59719 (The new attack path is distinct but related).Active exploitation has been observed in the wild since at least January 15, 2026. The activity is described as automated, suggesting that threat actors have developed reliable tooling to scan for and exploit vulnerable firewalls at scale. The malicious SSO logins have been traced back to a small number of hosting providers.
The core of the vulnerability lies in how the FortiGate appliance validates SAML assertions during the SSO login process. A flaw allows an attacker to craft a request that tricks the firewall into granting an authenticated session without proper validation from the Identity Provider (IdP).
T1190 - Exploit Public-Facing Applicationfortinet-tech, admin-tech) to ensure persistent access even if the SSO path is fixed. T1136.001 - Create Account: Local AccountT1005 - Data from Local SystemThe compromise of a perimeter firewall is one of the most critical security incidents an organization can face.
| Type | Value | Description |
|---|---|---|
| log_source | FortiGate Event Logs (System) | Look for the creation of new local administrator accounts, especially with non-standard names like 'fortinet-tech' or 'admin-tech'. |
| log_source | FortiGate Event Logs (System) | Monitor for successful SAML logins from unexpected IP addresses or Identity Providers. |
| process_name | sslvpnd |
The SSL VPN daemon process. Monitor for crashes or anomalous behavior. |
| command_line_pattern | diagnose debug |
Attackers may use diagnostic commands to gather information after compromise. Monitor for their use outside of normal troubleshooting windows. |
D3-DAM: Domain Account Monitoring (applied here to appliance accounts) to baseline and detect new account creation.D3-SU: Software Update.Fortinet confirmed active exploitation of FortiCloud SSO bypass on fully patched FortiGate firewalls. Attackers gain admin access and exfiltrate configurations.
Fortinet has officially confirmed active exploitation of a critical authentication bypass vulnerability affecting its FortiCloud Single Sign-On (SSO) feature on FortiGate firewalls. This vulnerability, explicitly linked to CVE-2025-59718 and CVE-2025-59719, is being successfully exploited even on fully patched devices. Attackers are leveraging specially crafted SAML messages to gain unauthorized administrative access. Post-exploitation activities include creating persistent administrative accounts, enabling remote access VPNs, and exfiltrating sensitive device configurations, posing a severe risk of long-term network compromise.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats