Hackers breach Fortinet FortiGate devices, steal firewall configs
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章主要讲的是Fortinet的FortiGate设备最近遭受了一系列自动化的网络攻击。攻击者利用了设备中的一个未知漏洞,特别是单点登录(SSO)功能中的漏洞,创建了流氓账户,并窃取了防火墙的配置数据。 攻击活动从1月15日开始,攻击者在短时间内就能创建VPN访问权限并导出配置,这表明攻击是自动化的。Arctic Wolf公司在1月17日报告了这些事件,并指出这些攻击与他们在去年12月记录的事件非常相似,那次事件涉及CVE-2025-59718这个关键认证绕过漏洞。 这个漏洞允许未经身份验证的攻击者通过恶意构造的SAML消息绕过SSO认证。虽然Fortinet已经发布了补丁,但最新的FortiOS版本7.4.10似乎没有完全修复这个问题。因此,Fortinet计划在未来几天发布新的版本来解决这个问题。 受影响的管理员提到,在SSO登录后,攻击者创建了管理员账户,并且这些活动与Arctic Wolf检测到的指标相吻合。为了应对这些攻击,建议管理员暂时禁用FortiCloud SSO功能。 此外,Shadowserver基金会正在追踪近1.1万台暴露在互联网上的FortiGate设备,这些设备启用了FortiCloud SSO。CISA也将CVE-2025-59718添加到被利用的漏洞列表中,并要求联邦机构在一周内打补丁。 总结一下,文章的核心信息是:FortiGate设备遭遇自动化攻击,利用SSO漏洞创建流氓账户并窃取配置数据;这些攻击与之前发现的CVE-2025-59718漏洞有关; Fortinet正在准备发布新补丁;建议用户暂时禁用相关功能以应对威胁。 </think> Fortinet FortiGate设备近期遭遇自动化网络攻击,利用单点登录(SSO)功能中的未知漏洞创建流氓账户并窃取防火墙配置数据。该活动始于1月15日,与去年12月发现的关键认证绕过漏洞(CVE-2025-59718)相关。尽管已有补丁发布,但最新版本尚未完全修复问题。建议用户暂时禁用FortiCloud SSO功能以应对威胁。 2026-1-22 12:0:33 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Fortinet

Fortinet FortiGate devices are being targeted in automated attacks that create rogue accounts and steal firewall configuration data, according to cybersecurity company Arctic Wolf.

The campaign started last week, on January 15, with the attackers exploiting an unknown vulnerability in the devices' single sign-on (SSO) feature to create accounts with VPN access and exporting firewall configurations within seconds, indicating automated activity.

Arctic Wolf, which reported these incidents on Wednesday, says the attacks are very similar to incidents it documented in December following the disclosure of a critical authentication bypass vulnerability (CVE-2025-59718) in Fortinet products.

Wiz

That flaw allows unauthenticated attackers to bypass SSO authentication on vulnerable FortiGate firewalls via maliciously crafted SAML messages when FortiCloud SSO features are enabled.

"While the parameters of initial access details have not been fully confirmed, the current campaign bears similarity to a campaign described by Arctic Wolf in December 2025," Arctic Wolf said. "It is not known at this time whether the latest threat activity observed is fully covered by the patch that initially addressed CVE-2025-59718 and CVE-2025-59719."

Arctic Wolf's advisory follows a wave of reports from Fortinet customers about attackers likely exploiting a patch bypass for the CVE-2025-59718 vulnerability to hack patched firewalls.

Affected admins said that Fortinet reportedly confirmed that the latest FortiOS version (7.4.10) doesn't fully address the authentication bypass flaw, which should have already been patched since early December with the release of FortiOS 7.4.9.

Fortinet is also allegedly planning to release FortiOS 7.4.11, 7.6.6, and 8.0.0 over the coming days to fully address the CVE-2025-59718 security flaw.

Affected Fortinet customers also shared logs showing that the attackers created admin users after an SSO login from [email protected] on IP address 104.28.244.114, which matches indicators of compromise detected by Arctic Wolf while analyzing ongoing FortiGate attacks and previous exploitation the cybersecurity firm observed in December.

Disable FortiCloud SSO to block attacks

Until Fortinet fully patches FortiOS against these ongoing attacks, admins can secure their firewalls by temporarily turning off the vulnerable FortiCloud login feature (if enabled) by going to System -> Settings and switching "Allow administrative login using FortiCloud SSO" to Off.

Another option is to run the following commands from the command-line interface:

config system global
set admin-forticloud-sso-login disable
end

Internet security watchdog Shadowserver is currently tracking nearly 11,000 Fortinet devices that are exposed online and have FortiCloud SSO enabled.

CISA has also added CVE-2025-59718 to its catalog of flaws exploited in attacks on December 16 and has ordered federal agencies to patch within a week.

BleepingComputer reached out to Fortinet multiple times this week with questions about these FortiGate attacks, but the company has yet to reply.

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/security/hackers-breach-fortinet-fortigate-devices-steal-firewall-configs/
如有侵权请联系:admin#unsafe.sh