Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

Posted on January 23, 2026January 23, 2026 By CWS

Ravie LakshmananJan 23, 2026Network Safety / Vulnerability
Fortinet has formally confirmed that it is working to fully plug a FortiCloud SSO authentication bypass vulnerability following stories of recent exploitation exercise on fully-patched firewalls.
“Within the final 24 hours, we have now recognized quite a lot of circumstances the place the exploit was to a tool that had been totally upgraded to the newest launch on the time of the assault, which instructed a brand new assault path,” Fortinet Chief Data Safety Officer (CISO) Carl Windsor stated in a Thursday submit.
The exercise basically mounts to a bypass for patches put in place by the community safety vendor to deal with CVE-2025-59718 and CVE-2025-59719, which may permit unauthenticated bypass of SSO login authentication through crafted SAML messages if the FortiCloud SSO function is enabled on affected units. The problems had been initially addressed by Fortinet final month.
Nonetheless, earlier this week, stories emerged of renewed exercise during which malicious SSO logins on FortiGate home equipment had been recorded towards the admin account on units that had been patched towards the dual vulnerabilities. The exercise is much like incidents noticed in December, shortly after the disclosure of the CVE-2025-59718 and CVE-2025-59719.

The exercise entails the creation of generic accounts for persistence, making configuration adjustments granting VPN entry to these accounts, and the exfiltration of firewall configurations to totally different IP addresses. The risk actor has been noticed logging in with accounts named “[email protected]” and “[email protected].”
As mitigations, the corporate is urging the next actions –

Prohibit administrative entry of edge community machine through the web by making use of a local-in coverage
Disable FortiCloud SSO logins by disabling “admin-forticloud-sso-login”

“You will need to observe that whereas, right now, solely exploitation of FortiCloud SSO has been noticed, this subject is relevant to all SAML SSO implementations,” Fortinet stated.

The Hacker News Tags:Active, Bypass, Confirms, Firewalls, FortiCloud, Fortigate, Fortinet, Fully, Patched, SSO

Post navigation

Previous Post: Cyber Insights 2026: Regulations and the Tangled Mess of Compliance Requirements
Next Post: Microsoft to Add Brand Impersonation Protection Warning to Teams Calls

Related Posts

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims The Hacker News
OpenAI Introduces Daybreak for Enhanced Cyber Security OpenAI Introduces Daybreak for Enhanced Cyber Security The Hacker News
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch The Hacker News
Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users The Hacker News
Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown The Hacker News
Why 2026 Will be the Year of Machine-Speed Security Why 2026 Will be the Year of Machine-Speed Security The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark