Fortinet on Tuesday introduced patches for 18 vulnerabilities throughout its merchandise, together with two flaws that might permit attackers to bypass authentication.
Tracked as CVE-2025-59718 and CVE-2025-59719 (CVSS rating of 9.8), the 2 bugs are described as improper verification of cryptographic signature points. They impression FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.
In accordance with Fortinet, the weaknesses permit attackers to ship crafted SAML response messages to weak home equipment and bypass the FortiCloud SSO login authentication.
The characteristic, Fortinet explains, is disabled in default manufacturing unit settings, however is enabled when a brand new machine is registered to FortiCare.
“When an administrator registers the machine to FortiCare from the machine’s GUI, until the administrator disables the toggle change ‘Permit administrative login utilizing FortiCloud SSO’ within the registration web page, FortiCloud SSO login is enabled upon registration,” the corporate notes in its advisory.
The defect was resolved in FortiOS variations 7.6.4, 7.4.9, 7.2.12, and seven.0.18, FortiProxy variations 7.6.4, 7.4.11, 7.2.15, and seven.0.22, FortiSwitchManager variations 7.2.7 and seven.0.6, and FortiWeb variations 8.0.1, 7.6.5, and seven.4.10.
Directors are suggested to disable the FortiCloud login characteristic quickly till they apply patches for the 2 safety holes.
On Tuesday, Fortinet additionally launched patches for 3 high-severity vulnerabilities in FortiWeb, FortiSandbox, and FortiVoice that might permit attackers to execute arbitrary operations or unauthorized code on the system, and to jot down arbitrary recordsdata.Commercial. Scroll to proceed studying.
The remaining flaws patched this week are medium- and low-severity points in FortiWeb, FortiSOAR, FortiPortal, FortiOS, FortiProxy, FortiPAM, FortiSRA, FortiAuthenticator, FortiExtender API, FortiVoice, FortiSandbox, FortiManager, and FortiAnalyzer.
Fortinet makes no point out of any of those vulnerabilities being exploited within the wild. Extra info may be discovered on the corporate’s safety advisories web page.
Associated: Ivanti EPM Replace Patches Crucial Distant Code Execution Flaw
Associated: SAP Patches Crucial Vulnerabilities With December 2025 Safety Updates
Associated: Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week
Associated: Fortinet Confirms Lively Exploitation of Crucial FortiWeb Vulnerability
