Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,抓住关键点。 文章讲的是Fortinet发现了一个新的漏洞,涉及FortiCloud的SSO认证绕过。攻击者利用这个漏洞,即使设备已经打了补丁,也能绕过认证。这可能是因为攻击路径发生了变化。 然后,文章提到攻击者创建通用账户,更改配置以获取VPN访问权限,并窃取防火墙配置。Fortinet建议采取限制管理访问和禁用SSO登录等措施。 我需要把这些信息浓缩到一百字以内,确保涵盖主要事件:漏洞、攻击手段、影响和应对措施。同时,保持语言简洁明了。 最后,检查一下是否符合用户的要求,没有使用特定的开头词,并且控制在字数限制内。 </think> Fortinet发现其 FortiCloud SSO 存在认证绕过漏洞,尽管设备已打补丁仍被攻击。攻击者利用恶意 SAML 消息绕过 SSO 登录认证,并创建通用账户获取 VPN 访问权限及窃取配置。Fortinet 建议限制管理访问并禁用 FortiCloud SSO 登录功能以缓解风险。 2026-1-23 12:30:0 Author: thehackernews.com(查看原文) 阅读量:2 收藏

Network Security / Vulnerability

Fortinet has officially confirmed that it's working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh exploitation activity on fully-patched firewalls.

"In the last 24 hours, we have identified a number of cases where the exploit was to a device that had been fully upgraded to the latest release at the time of the attack, which suggested a new attack path," Fortinet Chief Information Security Officer (CISO) Carl Windsor said in a Thursday post.

The activity essentially mounts to a bypass for patches put in place by the network security vendor to address CVE-2025-59718 and CVE-2025-59719, which could allow unauthenticated bypass of SSO login authentication via crafted SAML messages if the FortiCloud SSO feature is enabled on affected devices. The issues were originally addressed by Fortinet last month.

However, earlier this week, reports emerged of renewed activity in which malicious SSO logins on FortiGate appliances were recorded against the admin account on devices that had been patched against the twin vulnerabilities. The activity is similar to incidents observed in December, shortly after the disclosure of the CVE-2025-59718 and CVE-2025-59719.

Cybersecurity

The activity involves the creation of generic accounts for persistence, making configuration changes granting VPN access to those accounts, and the exfiltration of firewall configurations to different IP addresses. The threat actor has been observed logging in with accounts named "[email protected]" and "[email protected]."

As mitigations, the company is urging the following actions -

  • Restrict administrative access of edge network device via the internet by applying a local-in policy
  • Disable FortiCloud SSO logins by disabling "admin-forticloud-sso-login"

"It is important to note that while, at this time, only exploitation of FortiCloud SSO has been observed, this issue is applicable to all SAML SSO implementations," Fortinet said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/fortinet-confirms-active-forticloud-sso.html
如有侵权请联系:admin#unsafe.sh