Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Palo Alto Networks security advisory (AV26-331)

    April 8, 2026

    SonicWall security advisory (AV26-332) – Canadian Centre for Cyber Security

    April 8, 2026

    ICTBroadcast Command Injection Actively Exploited (CVE-2025-2611) | Blog

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»Enemy at the FortiGates: Fortinet Devices Remain Vulnerable
    Alerts

    Enemy at the FortiGates: Fortinet Devices Remain Vulnerable

    adminBy adminMarch 26, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Enemy at the FortiGates: Fortinet Devices Remain Vulnerable to SSO Authentication Bypass  

    This report is distributed as TLP:CLEAR. Recipients may share this information without restriction. Information is subject to standard copyright rules. 

    Summary 

    Starting 15 January 2026, security researchers at Arctic Wolf identified the compromise of fully-patched Fortinet FortiGate devices where attackers likely exploited the FortiCloud single sign-on (SSO) service. 

    On 22 January 2026, Fortinet acknowledged there is an active security issue with FortiCloud SSO that was not addressed in the December 2025 security patches for vulnerabilities CVE-2025-59718 and CVE-2025-59719. Fortinet urges customers to implement mitigations against this attack as a security patch is not available at the time of publication. 

    Details 

    On 9 December 2025, Fortinet released patches to address two critical vulnerabilities (CVE-2025-59718 and CVE-2025-59719) affecting FortiOS (used by FortiGate), FortiWeb, FortiProxy, and FortiSwitchManager. The vulnerabilities were in FortiCloud’s SSO service where an attacker could bypass authentication by sending a specially-crafted SAML request to gain administrative access. 

    Since 15 January 2026, Arctic Wolf observed malicious SSO authentications from accounts [email protected] and [email protected] to FortiGate devices. After successful compromise, attackers created additional accounts for persistence and exfiltrated firewall configuration files. The authentications originated from IPs provided by the hosting providers Cloudflare (AS13335), Galeon (AS209290), and HVC (AS29802). CSIRT Italy also corroborated this renewed exploitation activity. 

    On 22 January 2026, Fortinet’s security team (PSIRT) published an initial analysis of the security incidents reported by Arctic Wolf, noting “the exploit was to a device that had been fully upgraded to the latest release at the time of the attack, which suggested a new attack path.” 

    At the time of publication, there is neither an available security patch nor published CVE for Fortinet products affected by this new FortiCloud SSO vulnerability. Instead, Fortinet recommends implementing mitigations to disable FortiCloud SSO and further restrict administrative console access to internal networks. 

    CyberAlberta Threat Intelligence identified Fortinet assets in Alberta, although it is not clear what versions are installed or if the FortiCloud SSO login feature is enabled. 

    Assessment 

    CyberAlberta Threat Intelligence assesses it is likely that all versions of Fortinet products with the FortiCloud SSO service enabled remain vulnerable to an authentication bypass. If the FortiCloud SSO service is enabled, check for indicators of compromise and implement Fortinet’s recommended mitigations.  

    Recommendations 

    • Confirm if the FortiCloud SSO login feature is enabled, and disable if it is. 
    • To disable, go to System > Settings > Set “Allow administrative login using FortiCloud SSO” to Off. Or input the following command in the CLI

    config system global

    set admin-forticloud-sso-login disable

    end 

     

    • If FortiCloud SSO login feature is enabled and publicly accessible, investigate for signs of compromise including SAML requests from anomalous IPs, authentications with anomalous accounts such as [email protected] and [email protected], creation of new accounts and exfiltration of configuration data. 
    • If any evidence of compromise is identified, then disable any new accounts and rotate credentials for legitimate accounts. 
    • Continue to monitor for updates from Fortinet regarding any new patches. 
    • Restrict access to Fortinet management interfaces to trusted internal network ranges only. 

    Indicators of Compromise (IOCs) 

    The following IOCs are provided by Arctic Wolf to help identify evidence of exploitation: 

    Description  IOC 
    Exploitation and exfiltration IPs  104.28.244[.]115  
    104.28.212[.]114 
    217.119.139[.]50 
    37.1.209[.]19 
    Malicious account authentication  [email protected] 
    [email protected] 
    Maliciously-created local admin account  secadmin 
    itadmin 
    support 
    backup 
    remoteadmin 
    audit 

    Table 1 – IOCs provided by Arctic Wolf characterizing recent exploitation of FortiGate devices 



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleUNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering
    Next Article WAGO GmbH & Co. KG Industrial Managed Switches
    admin
    • Website

    Related Posts

    Alerts

    Palo Alto Networks security advisory (AV26-331)

    April 8, 2026
    Alerts

    SonicWall security advisory (AV26-332) – Canadian Centre for Cyber Security

    April 8, 2026
    Alerts

    Incident: Life Saving Victoria server hacked by ‘malicious actors’ | ABC News Australia

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Palo Alto Networks security advisory (AV26-331)

    April 8, 2026

    SonicWall security advisory (AV26-332) – Canadian Centre for Cyber Security

    April 8, 2026

    ICTBroadcast Command Injection Actively Exploited (CVE-2025-2611) | Blog

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.