Active Exploitation of CVE-2025-59718 Raises Urgency for Fortinet Users
Active exploitation of a Fortinet authentication bypass highlights the need to review SSO settings and apply updates promptly.
Active exploitation of a Fortinet authentication bypass highlights the need to review SSO settings and apply updates promptly.
A critical authentication bypass vulnerability, tracked as CVE-2025-59718, has been identified in multiple Fortinet products, with confirmed cases of real-world misuse. The issue deserves close attention because it affects how access is granted, not just how activity is monitored.
When authentication can be bypassed, attackers do not need persistence or advanced tooling. They only need the weakness to exist.
CVE-2025-59718 and the related CVE-2025-59719 stem from the same underlying design flaw. Both involve improper validation of signed authentication messages used when Fortinet products interact with a cloud-based single sign-on service.
Under normal conditions, these messages are cryptographically signed so the system can confirm they came from a trusted source. In the affected products, that verification is incomplete. A manipulated message can be accepted as legitimate, allowing an attacker to bypass the login process entirely.
The difference between the two CVEs lies in scope and impact, but CVE-2025-59718 stands out because misuse has already been observed. This shifts the issue from theoretical risk to operational concern.
Products impacted include core operating systems and management platforms commonly deployed at network boundaries or in centralized roles. That placement increases the potential impact of unauthorized access.
Authentication bypass vulnerabilities are particularly dangerous because they undermine trust assumptions. Monitoring tools may show a successful login, even though no valid credentials were used.
An administrator reviewing logs might see what appears to be normal access. Meanwhile, configuration changes or data access could already be taking place. This makes detection harder and response slower.
The situation is further complicated by feature activation paths. Although the affected single sign-on functionality is not enabled in default factory settings, it can be activated during routine administrative tasks. If an administrator does not explicitly disable it, the system may accept external authentication messages without clear warning.
This creates environments where teams believe they are unaffected, while the condition for exploitation quietly exists.
The most direct mitigation is to apply the available updates that correct the signature verification logic. This closes the door regardless of configuration state.
In parallel, teams should verify whether the single sign-on integration is enabled. If the feature is not required, disabling it removes the attack surface entirely. This is especially important for systems accessible from untrusted networks.
It is also worth documenting why authentication features are enabled or disabled. Clear records reduce guesswork during incident response and make future reviews faster and more reliable.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.6 | 7.6.0 through 7.6.3 | Upgrade to 7.6.4 or above |
| FortiOS 7.4 | 7.4.0 through 7.4.8 | Upgrade to 7.4.9 or above |
| FortiOS 7.2 | 7.2.0 through 7.2.11 | Upgrade to 7.2.12 or above |
| FortiOS 7.0 | 7.0.0 through 7.0.17 | Upgrade to 7.0.18 or above |
| FortiOS 6.4 | Not affected | Not Applicable |
| FortiProxy 7.6 | 7.6.0 through 7.6.3 | Upgrade to 7.6.4 or above |
| FortiProxy 7.4 | 7.4.0 through 7.4.10 | Upgrade to 7.4.11 or above |
| FortiProxy 7.2 | 7.2.0 through 7.2.14 | Upgrade to 7.2.15 or above |
| FortiProxy 7.0 | 7.0.0 through 7.0.21 | Upgrade to 7.0.22 or above |
| FortiSwitchManager 7.2 | 7.2.0 through 7.2.6 | Upgrade to 7.2.7 or above |
| FortiSwitchManager 7.0 | 7.0.0 through 7.0.5 | Upgrade to 7.0.6 or above |
| FortiWeb 8.0 | 8.0.0 | Upgrade to 8.0.1 or above |
| FortiWeb 7.6 | 7.6.0 through 7.6.4 | Upgrade to 7.6.5 or above |
| FortiWeb 7.4 | 7.4.0 through 7.4.9 | Upgrade to 7.4.10 or above |
| FortiWeb 7.2 | Not affected | Not Applicable |
| FortiWeb 7.0 | Not affected | Not Applicable |
CVE-2025-59718 highlights how small verification gaps can lead to serious access failures, especially when combined with complex configuration paths. The presence of a second related issue, CVE-2025-59719, reinforces the need for careful review rather than quick assumptions.
By applying updates and confirming authentication settings, organizations can address the risk directly. The lesson is straightforward: access controls deserve regular scrutiny, even when they appear unchanged.