Zero Day campaigns targeting Fortinet CVES CVE-2025-59718 and CVE-2025-59719

Targeted Sectors

·         Finance

·         Telecommunications0

·         Government

·         Energy

·         Critical Infrastructure

Targeted Countries

·         Germany

·         France

·         United Kingdom

·         Netherlands

·         Italy

·         Spain

·         Belgium

·         Sweden

·         United States

·         Australia

BLUF

Unauthenticated remote attackers can bypass administrative authentication on Fortinet devices by submitting forged SAML response messages with spoofed cryptographic signatures. This allows full administrative access to the device GUI. The vulnerable feature, FortiCloud SSO, is often automatically enabled when a device is registered. Active exploitation was confirmed starting December 12, 2025, primarily to exfiltrate hashed configuration files.

 

CVE-2025-59718

FortiOS, FortiProxy, FortiSwitchManager

CVSS 3.1 Vector

·         (9.1) AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Nessus ID

213032

Is this on the KEV list?

·         Yes

CISA patch by date

·         December 23, 2025

Patching/Mitigation Data

Patch Release Date

·         December 9, 2025

URL to patch

·         hxxps://www.fortiguard.com/psirt/FG-IR-25-647

Mitigation Data

·         Workaround: Disable FortiCloud SSO via CLI: config system global, set admin-forticloud-sso-login disable, end.

CVE-2025-59719

(FortiWeb)

CVSS 3.1 Vector

(9.1) AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Nessus ID

213032

Is this on the KEV list?

·         Yes

CISA patch by date

·         December 23, 2025

Patching/Mitigation Data

Patch Release Date

·         December 9, 2025

URL to patch

·         hxxps://www.fortiguard.com/psirt/FG-IR-25-647

Workaround

·         Disable administrative SSO login in the GUI under System -> Settings.

Date of First Reported Activity

·         December 12, 2025

Date of Last Reported Activity Update

·         December 16, 2025

APT Names

·         No specific APT groups have been named at this time

Associated Criminal Organization Names

·         No specific criminal organizations have been named at this time

Malware Names

·         No custom malware deployed; actors utilize "Living-off-the-Land" techniques post-login.

Malware Samples

·         No malware has been identified at this time

Tools Used

·         Forged SAML Assertion Generators

·         Python-based exploit scripts

Delivery Method

·         Network-based direct exploitation of the administrative login interface (typically Port 443).

IOCs

Please keep in mind that IOCs are usually dynamic.  They should be checked but generally used to identify patterns of behavior.

Attacker Ips

·         45.32.153.218

·         167.179.76.111.

Target Account

·         The default admin account is the primary target for the bypass.

Audit Log Indicator

·         Log entries showing successful login for admin via FortiCloud SSO from unexpected external IP addresses.

TTPs

Initial Access & Exploitation

·         T1190: Exploit Public-Facing Application

o   Attackers target management interfaces exposed to the internet, specifically those where FortiCloud SSO is enabled

·         T1556.006: Modify Authentication Process (SAML Modification)

o   Adversaries deliver a crafted SAML response message with a forged or improperly verified cryptographic signature. This allows the attacker to bypass the authentication routine and gain a valid administrative session.

·         Targeting Default Accounts

o   Exploitation efforts have predominantly targeted the "admin" account to achieve maximum privileges immediately upon bypass.

Execution & Persistence

·         T1078.001 Valid Accounts (Default Accounts)

o   After the bypass, attackers operate as a legitimate administrative user, blending in with standard management activity.

·         T1133: External Remote Services

o   Once administrative access is gained, actors may modify VPN policies or create new administrative accounts to ensure long-term, "authorized" remote access.

Collection & Exfiltration

·         T1005: Data from Local System

o   A primary objective observed in mid-December 2025 campaigns is the export of device configurations via the GUI.

·         Credential Harvesting

o   Threat actors exfiltrate these configuration files to extract hashed credentials. These hashes are then cracked offline to facilitate lateral movement into the internal network.

·         T1041 Exfiltration Over C2 Channel

o   Stolen configuration data is sent directly back to the attacker's infrastructure, often hosted on providers like The Constant Company (Vultr), BI Networks, and Kaopu Cloud

Impact

·         Network Sabotage

o   Administrative access allows attackers to disable inspection engines, introduce malicious routing rules, and push configuration changes across the switching infrastructure via FortiSwitchManager.

Key Detection & Mitigation Indicators

·         Anomalous SSO Logins: Monitor logs for successful "FortiCloud SSO" logins for the admin account originating from unknown hosting provider IPs (e.g., 45.32.153.218, 167.179.76.111).

Suggested Rules/ potential hunts

These are indicator rules they are likely to be noisy. For easiest results perform investigaitons via data models.

Suricata Rule

alert tcp $EXTERNAL_NET any -> $HOME_NET $HTTP_PORTS (msg:"Exploit Fortinet FortiCloud SSO Auth Bypass (CVE-2025-59718)"; flow:established,to_server; content:"SAMLResponse="; http_client_body; pcre:"/ID=\"_bypass/i"; sid:202559718; rev:1;)

SentinelOne Query

Indicator == "SAML Bypass" AND ParentProcessName == "sslvpnd" OR ProcessName == "httpsd" AND Commandline Contains "saml/login"

Splunk Hunt

index=fortinet sourcetype=fortios_log action="login" msg="*FortiCloud SSO*" | stats count by user, src_ip, dst_ip | where NOT cidrmatch("Internal_Network_CIDR", src_ip)

References

Fortinet

·         hxxps://www.fortiguard.com/psirt/FG-IR-25-647

ArticWolf

·         hxxps://arcticwolf.com/resources/blog/cve-2025-59718-and-cve-2025-59719/

Bleeping Computer

·         hxxps://www.bleepingcomputer.com/news/security/hackers-exploit-newly-patched-fortinet-auth-bypass-flaws/

Cyber Gov AU

·         hxxps://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-in-multiple-fortinet-products-forticloud-sso-login-authentication-bypass

Previous
Previous

Russian GRU Campaign Targeting Western Critical Infrastructure

Next
Next

Gentlemen Ransomware "Double Extortion"