Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Fortinet Patches Critical Authentication Bypass Vulnerabilities

The two security defects impact FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager with FortiCloud SSO login authentication enabled.

Fortinet patches

Fortinet on Tuesday announced patches for 18 vulnerabilities across its products, including two critical-severity flaws that could allow attackers to bypass authentication.

Tracked as CVE-2025-59718 and CVE-2025-59719 (CVSS score of 9.8), the two bugs are described as improper verification of cryptographic signature issues. They impact FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.

According to Fortinet, the weaknesses allow attackers to send crafted SAML response messages to vulnerable appliances and bypass the FortiCloud SSO login authentication.

The feature, Fortinet explains, is disabled in default factory settings, but is enabled when a new device is registered to FortiCare.

“When an administrator registers the device to FortiCare from the device’s GUI, unless the administrator disables the toggle switch ‘Allow administrative login using FortiCloud SSO’ in the registration page, FortiCloud SSO login is enabled upon registration,” the company notes in its advisory.

The defect was resolved in FortiOS versions 7.6.4, 7.4.9, 7.2.12, and 7.0.18, FortiProxy versions 7.6.4, 7.4.11, 7.2.15, and 7.0.22, FortiSwitchManager versions 7.2.7 and 7.0.6, and FortiWeb versions 8.0.1, 7.6.5, and 7.4.10.

Advertisement. Scroll to continue reading.

Administrators are advised to disable the FortiCloud login feature temporarily until they apply patches for the two security holes.

On Tuesday, Fortinet also released patches for three high-severity vulnerabilities in FortiWeb, FortiSandbox, and FortiVoice that could allow attackers to execute arbitrary operations or unauthorized code on the system, and to write arbitrary files.

The remaining flaws patched this week are medium- and low-severity issues in FortiWeb, FortiSOAR, FortiPortal, FortiOS, FortiProxy, FortiPAM, FortiSRA, FortiAuthenticator, FortiExtender API, FortiVoice, FortiSandbox, FortiManager, and FortiAnalyzer.

Fortinet makes no mention of any of these vulnerabilities being exploited in the wild. Additional information can be found on the company’s security advisories page.

Related: Ivanti EPM Update Patches Critical Remote Code Execution Flaw

Related: SAP Patches Critical Vulnerabilities With December 2025 Security Updates

Related: Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week

Related: Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.