Fortinet Fiasco: Hackers Exploit Vulnerabilities Faster Than You Can Say “Patch”
Fortinet vulnerabilities are like the hot new single—already being exploited just days after release! Threat actors are diving into CVE-2025-59718 and CVE-2025-59719 with gusto, crafting SAML response messages to bypass FortiCloud SSO. Remember, if your devices are singing the wrong tune, it’s time to reset those credentials and restrict access.

Hot Take:
In the cybersecurity world, it’s a dog-eat-dog scenario, and Fortinet’s vulnerabilities are the latest bone of contention. Just three days post-patch, threat actors were already gnawing away, proving that when it comes to exploiting flaws, cybercriminals are as fast as a cheetah on Red Bull. Fortinet’s vulnerabilities were basically Tinder profiles for hackers: swiped right, and they were in!
Key Points:
- Two Fortinet vulnerabilities with a CVSS score of 9.8 were quickly exploited by threat actors.
- The flaws involve improper verification of cryptographic signatures in various Fortinet products.
- Exploitation began just three days after patches were released, targeting admin accounts via SSO logins.
- Threat actors exported device configurations, which included hashed credentials, for offline cracking.
- Administrators are urged to disable certain features and restrict access to trusted networks.
Already a member? Log in here
