Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation

CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation

Posted on December 17, 2025December 17, 2025 By CWS

CISA has formally added CVE-2025-59718 to its Recognized Exploited Vulnerabilities (KEV) catalog on December 16, 2025.

Designating a essential deadline of December 23, 2025, for organizations to use essential remediation measures.

This motion displays the vulnerability’s energetic exploitation within the wild and the instant risk it poses to enterprise networks.

The vulnerability impacts a number of Fortinet safety merchandise, together with FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb.

The flaw lies within the improper verification of cryptographic signatures, permitting unauthenticated attackers to bypass FortiCloud Single Signal-On (SSO) authentication by way of specifically crafted SAML messages.

This authentication bypass vulnerability offers a direct path to unauthorized community entry with out requiring legitimate credentials.

Fortinet has addressed this subject via vendor advisories, with directors instructed to use all accessible patches instantly.

DetailInformationCVE IDCVE-2025-59718CWE ClassificationCWE-347 (Improper Verification of Cryptographic Signature)Vulnerability TypeAuthentication Bypass by way of SAMLAttack VectorUnauthenticated, Community-based

A associated vulnerability, CVE-2025-59719, pertains to the identical underlying subject and is documented in the identical advisory, requiring complete patching throughout affected programs.

The vulnerability is assessed below CWE-347 (Improper Verification of Cryptographic Signature), highlighting the particular weak point within the authentication mechanism.

CISA’s inclusion within the KEV catalog mandates compliance with federal safety steering, notably for businesses working cloud companies.

Organizations should observe relevant BOD 22-01 steering when implementing cloud-based Fortinet options.

For environments the place patches can’t be instantly deployed, CISA recommends discontinuing product use till mitigations can be found and verified.

The timing of this KEV addition is critical, as energetic exploitation signifies risk actors are already leveraging this vulnerability in operational assaults.

Nevertheless, CISA’s present evaluation doesn’t conclusively hyperlink the vulnerability to ransomware campaigns, although this classification might evolve as risk intelligence develops.

Safety groups ought to prioritize remediation of CVE-2025-59718 inside their patch administration cycles. Significantly for edge safety home equipment and net utility firewalls which may be straight uncovered to the web.

Organizations operating affected Fortinet merchandise ought to instantly audit their deployment stock.

And provoke emergency patching procedures earlier than the December 23 deadline to keep up compliance and stop credential-free community intrusion.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Active, Adds, Catalog, CISA, Exploitation, Fortinet, KEV, Vulnerability

Post navigation

Previous Post: New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules
Next Post: Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking

Related Posts

Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware Cyber Security News
Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links Cyber Security News
Critical Samba RCE Vulnerability Enables Arbitrary Code Execution Critical Samba RCE Vulnerability Enables Arbitrary Code Execution Cyber Security News
Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code Cyber Security News
BQTLOCK Ransomware Operates as RaaS With Advanced Evasion Techniques BQTLOCK Ransomware Operates as RaaS With Advanced Evasion Techniques Cyber Security News
Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark