Fortinet confirms critical FortiCloud auth bypass not fully patched
Recorded: Jan. 23, 2026, 12:05 p.m.
| Original | Summarized |
Fortinet confirms critical FortiCloud auth bypass not fully patched News Featured Curl ending bug bounty program after flood of AI slop reports INC ransomware opsec fail allowed data recovery for 12 US orgs Cisco fixes Unified Communications RCE zero day exploited in attacks Hackers exploit 29 zero-days on second day of Pwn2Own Automotive Fortinet confirms critical FortiCloud auth bypass not fully patched Okta SSO accounts targeted in vishing-based data theft attacks This $35 Swifdoo PDF editor license lasts for life Curl ending bug bounty program after flood of AI slop reports Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityFortinet confirms critical FortiCloud auth bypass not fully patched Fortinet confirms critical FortiCloud auth bypass not fully patched By Sergiu Gatlan January 23, 2026 Days after admins began reporting that their fully patched firewalls are being hacked, Fortinet confirmed it's working to fully address a critical FortiCloud SSO authentication bypass vulnerability that should have already been patched since early December. On Thursday, Fortinet finally confirmed these reports, stating that ongoing CVE-2025-59718 attacks match December's malicious activity and that it's now working to fully patch the flaw. The 2026 CISO Budget Benchmark Related Articles: Actively Exploited Sergiu Gatlan Previous Article Post a Comment Community Rules You need to login in order to post a comment Not a member yet? Register Now You may also like: Popular Stories Fortinet admins report patched FortiGate firewalls getting hacked Hackers breach Fortinet FortiGate devices, steal firewall configs Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026 Sponsor Posts Identity Governance & Threat Detection in one: Get a guided tour of our platform Overdue a password health-check? Audit your Active Directory for free Discover how phishing kits are sold and deployed. Download the full research report. Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
Fortinet is currently grappling with a critical security vulnerability affecting its FortiCloud SSO authentication system. The issue, initially flagged as CVE-2025-59718, has seen threat actors successfully exploiting fully patched FortiGate firewalls through a bypass mechanism. Cybersecurity firm Arctic Wolf first identified the campaign beginning on January 15, 2026, where attackers rapidly gained access to firewall configurations by leveraging VPN accounts and automating attacks. This occurred despite the devices having been updated to the latest release. Fortinet confirmed these reports on Thursday, January 23, 2026, stating that the attacks closely mirrored previous activity linked to the same vulnerability, which was disclosed in December. The attackers were able to create administrative user accounts utilizing an SSO login from the IP address 104.28.244.114, mirroring indicators of compromise identified by Arctic Wolf and previously reported by Fortinet. Chief Information Security Officer (CISO) Carl Windsor advised affected customers to immediately implement defensive measures, including restricting administrative access to edge network devices via a local-in policy, limiting access to specific IP addresses, and disabling the FortiCloud SSO feature through System -> Settings -> Switch, toggling off the “Allow administrative login using FortiCloud SSO” option. Windsor further instructed customers to treat any compromised systems as such, rotate credentials, and restore their configuration via a known clean version. Shadowserver currently tracks approximately 11,000 Fortinet devices exposed online with FortiCloud SSO enabled. The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-59718 to its list of actively exploited vulnerabilities on December 16, 2026, and ordered federal agencies to patch the system within a week. BleepingComputer has been attempting to obtain a response from Fortinet regarding these ongoing attacks, but as of yet, the company has not provided a direct response. This vulnerability highlights a serious flaw in the security architecture of Fortinet's cloud-based services, necessitating immediate action by users to mitigate the risk of unauthorized access and data compromise. The situation underscores the importance of continuously monitoring security systems, promptly applying patches, and implementing robust access control measures, particularly for services relying on cloud-based authentication. The incident’s timeline, with the initial disclosure in December and subsequent exploitation commencing in January, illustrates the critical need for rapid responses to emerging vulnerabilities within the cybersecurity landscape. |