Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59718: Improper access control in Fortinet FortiOS

0
Critical
VulnerabilityCVE-2025-59718cvecve-2025-59718
Published: Tue Dec 09 2025 (12/09/2025, 17:20:11 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:02:37 UTC

Technical Analysis

CVE-2025-59718 is a critical security vulnerability discovered in Fortinet's FortiOS, FortiProxy, and FortiSwitchManager products across multiple versions (FortiOS 7.0.0 through 7.6.3, FortiProxy 7.0.0 through 7.6.3, FortiSwitchManager 7.0.0 through 7.2.6). The root cause is an improper verification of cryptographic signatures in SAML response messages used by FortiCloud Single Sign-On (SSO) authentication. This flaw allows an unauthenticated attacker to craft a malicious SAML response that bypasses the authentication mechanism, effectively granting unauthorized access to the system. The vulnerability impacts confidentiality, integrity, and availability, as attackers can gain full control without any user interaction or prior authentication. The CVSS v3.1 base score of 9.1 (critical) reflects the ease of exploitation (network vector, low complexity, no privileges required, no user interaction) and the severe impact on all security properties. Although no public exploits are reported yet, the vulnerability is highly likely to be targeted due to the widespread use of Fortinet products in enterprise and critical infrastructure environments. The improper cryptographic verification suggests a failure in validating the authenticity and integrity of SAML assertions, which are fundamental to secure federated identity management. This could lead to unauthorized access to sensitive network resources, data exfiltration, and potential lateral movement within affected networks. The vulnerability affects multiple Fortinet products that are widely deployed in European organizations for firewalling, proxy services, and network management, making it a significant threat vector.

Potential Impact

For European organizations, the impact of CVE-2025-59718 is substantial. Fortinet products are extensively used across Europe in government, finance, telecommunications, and critical infrastructure sectors. Exploitation of this vulnerability allows attackers to bypass authentication controls, potentially gaining administrative access to network security devices. This can lead to unauthorized data access, manipulation of network traffic, disruption of services, and deployment of further attacks such as ransomware or espionage. The breach of SSO authentication undermines trust in identity management systems, increasing the risk of persistent threats and insider-like access. Given the criticality of affected systems in network perimeter defense and internal segmentation, a successful attack could compromise entire organizational networks. The lack of required authentication or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. Additionally, the vulnerability could be leveraged to target European Union institutions and companies subject to strict data protection regulations (e.g., GDPR), resulting in legal and financial repercussions.

Mitigation Recommendations

Organizations should immediately inventory their Fortinet devices to identify affected versions of FortiOS, FortiProxy, and FortiSwitchManager. Although no patch links are provided yet, it is imperative to monitor Fortinet advisories and apply security updates as soon as they become available. In the interim, administrators should consider disabling FortiCloud SSO integration or restricting SAML authentication to trusted identity providers with additional verification layers. Implement network segmentation to isolate management interfaces and restrict access to Fortinet devices to trusted administrative networks only. Enable and closely monitor detailed authentication and access logs for anomalous SAML responses or unexpected login attempts. Employ multi-factor authentication (MFA) on all administrative accounts to add an additional security layer. Conduct penetration testing and vulnerability assessments focusing on SAML authentication flows to detect potential exploitation. Finally, establish incident response plans tailored to potential compromise scenarios involving Fortinet devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-09-19T04:30:39.464Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4c74ebaa3baba14018

Added to database: 12/9/2025, 5:37:16 PM

Last enriched: 1/14/2026, 3:02:37 PM

Last updated: 2/6/2026, 3:23:09 PM

Views: 303

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats