Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation

CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation

Posted on December 17, 2025December 17, 2025 By CWS

CISA has formally added CVE-2025-59718 to its Recognized Exploited Vulnerabilities (KEV) catalog on December 16, 2025.

Designating a essential deadline of December 23, 2025, for organizations to use essential remediation measures.

This motion displays the vulnerability’s energetic exploitation within the wild and the instant risk it poses to enterprise networks.

The vulnerability impacts a number of Fortinet safety merchandise, together with FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb.

The flaw lies within the improper verification of cryptographic signatures, permitting unauthenticated attackers to bypass FortiCloud Single Signal-On (SSO) authentication by way of specifically crafted SAML messages.

This authentication bypass vulnerability offers a direct path to unauthorized community entry with out requiring legitimate credentials.

Fortinet has addressed this subject via vendor advisories, with directors instructed to use all accessible patches instantly.

DetailInformationCVE IDCVE-2025-59718CWE ClassificationCWE-347 (Improper Verification of Cryptographic Signature)Vulnerability TypeAuthentication Bypass by way of SAMLAttack VectorUnauthenticated, Community-based

A associated vulnerability, CVE-2025-59719, pertains to the identical underlying subject and is documented in the identical advisory, requiring complete patching throughout affected programs.

The vulnerability is assessed below CWE-347 (Improper Verification of Cryptographic Signature), highlighting the particular weak point within the authentication mechanism.

CISA’s inclusion within the KEV catalog mandates compliance with federal safety steering, notably for businesses working cloud companies.

Organizations should observe relevant BOD 22-01 steering when implementing cloud-based Fortinet options.

For environments the place patches can’t be instantly deployed, CISA recommends discontinuing product use till mitigations can be found and verified.

The timing of this KEV addition is critical, as energetic exploitation signifies risk actors are already leveraging this vulnerability in operational assaults.

Nevertheless, CISA’s present evaluation doesn’t conclusively hyperlink the vulnerability to ransomware campaigns, although this classification might evolve as risk intelligence develops.

Safety groups ought to prioritize remediation of CVE-2025-59718 inside their patch administration cycles. Significantly for edge safety home equipment and net utility firewalls which may be straight uncovered to the web.

Organizations operating affected Fortinet merchandise ought to instantly audit their deployment stock.

And provoke emergency patching procedures earlier than the December 23 deadline to keep up compliance and stop credential-free community intrusion.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Active, Adds, Catalog, CISA, Exploitation, Fortinet, KEV, Vulnerability

Post navigation

Previous Post: New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules
Next Post: Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking

Related Posts

Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation Cyber Security News
17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability 17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability Cyber Security News
Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email Cyber Security News
Critical Vivotek Vulnerability Allows Remote Users to Inject Arbitrary Code Critical Vivotek Vulnerability Allows Remote Users to Inject Arbitrary Code Cyber Security News
New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild Cyber Security News
Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News