CYBERNEWSMEDIA Network:||
AD · 970×250

Vulnerabilities

Fortinet Patches Critical Authentication Bypass Vulnerabilities

The two security defects impact FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager with FortiCloud SSO login authentication enabled. The post Fortinet Patches Critical Authentication Bypass Vulnerabilities appeared first on SecurityWeek.

Fortinet patches

Fortinet on Tuesday announced patches for 18 vulnerabilities across its products, including two critical-severity flaws that could allow attackers to bypass authentication.

Tracked as CVE-2025-59718 and CVE-2025-59719 (CVSS score of 9.8), the two bugs are described as improper verification of cryptographic signature issues. They impact FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.

According to Fortinet, the weaknesses allow attackers to send crafted SAML response messages to vulnerable appliances and bypass the FortiCloud SSO login authentication.

The feature, Fortinet explains, is disabled in default factory settings, but is enabled when a new device is registered to FortiCare.

“When an administrator registers the device to FortiCare from the device’s GUI, unless the administrator disables the toggle switch ‘Allow administrative login using FortiCloud SSO’ in the registration page, FortiCloud SSO login is enabled upon registration,” the company notes in its advisory.

The defect was resolved in FortiOS versions 7.6.4, 7.4.9, 7.2.12, and 7.0.18, FortiProxy versions 7.6.4, 7.4.11, 7.2.15, and 7.0.22, FortiSwitchManager versions 7.2.7 and 7.0.6, and FortiWeb versions 8.0.1, 7.6.5, and 7.4.10.

Administrators are advised to disable the FortiCloud login feature temporarily until they apply patches for the two security holes.

On Tuesday, Fortinet also released patches for three high-severity vulnerabilities in FortiWeb, FortiSandbox, and FortiVoice that could allow attackers to execute arbitrary operations or unauthorized code on the system, and to write arbitrary files.

The remaining flaws patched this week are medium- and low-severity issues in FortiWeb, FortiSOAR, FortiPortal, FortiOS, FortiProxy, FortiPAM, FortiSRA, FortiAuthenticator, FortiExtender API, FortiVoice, FortiSandbox, FortiManager, and FortiAnalyzer.

Fortinet makes no mention of any of these vulnerabilities being exploited in the wild. Additional information can be found on the company’s security advisories page.

Related: Ivanti EPM Update Patches Critical Remote Code Execution Flaw

Related: SAP Patches Critical Vulnerabilities With December 2025 Security Updates

Related: Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week

Related: Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability

Latest News

CYBERNEWSMEDIAPublisher