Fortinet Flaws: Hackers Crash the Admin Party with SSO Shenanigans!

Hackers have found a new hobby: exploiting vulnerabilities in Fortinet products to crash admin parties and swipe system configuration files. These exploits, CVE-2025-59718 and CVE-2025-59719, turn FortiCloud SSO into a not-so-secure sign-on, with attackers getting unauthorized access and making off with valuable data. Fortinet urges disabling FortiCloud SSO until safer versions are installed.

Pro Dashboard

Hot Take:

Looks like the hackers are playing Santa with Fortinet systems, but instead of gifts, they’re leaving chaos under the admin’s firewall tree. These exploits are like the Grinch who stole Christmas, targeting Fortinet products to pilfer system configuration files. Fortinet users, it’s time to patch up before your network security gets stuffed down the chimney!

Key Points:

  • Hackers are exploiting CVE-2025-59718 and CVE-2025-59719 vulnerabilities in Fortinet products.
  • The vulnerabilities involve a FortiCloud SSO authentication bypass due to improper cryptographic signature verification.
  • Targeted attacks focus on admin accounts to download system configuration files.
  • Fortinet suggests disabling the FortiCloud login feature as a temporary measure.
  • Admins should upgrade to specific Fortinet versions to address the vulnerabilities and secure their systems.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?