Fortinet confirms critical FortiCloud auth bypass not fully patched
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容和关键点。 文章主要讲的是Fortinet的一个安全漏洞CVE-2025-59718,这个漏洞已经被利用来攻击他们的防火墙。尽管Fortinet在12月初就已经发布了补丁,但攻击者似乎找到了绕过补丁的方法,导致一些已经更新的防火墙仍然被攻破。 接着,文章提到Arctic Wolf公司报告说攻击者从1月15日开始利用这个漏洞,创建VPN账户并窃取防火墙配置。Fortinet在周四确认了这些报告,并表示正在努力修复这个问题。他们建议用户限制管理员访问,并禁用FortiCloud SSO功能。 此外,还有一些关于受影响客户日志的信息,显示攻击者通过特定IP地址创建了管理员账户。Shadowserver监测到近1.1万台Fortinet设备暴露在线上,并启用了FortiCloud SSO。CISA也将这个漏洞加入到活跃利用列表中,并要求联邦机构在一周内修补。 现在,我需要将这些信息浓缩到100字以内。要抓住主要点:漏洞名称、攻击情况、Fortinet的回应、建议措施以及受影响设备的数量。 可能的结构是:Fortinet确认CVE-2025-59718漏洞被绕过,导致已打补丁的防火墙被攻破;攻击者利用该漏洞创建账户并窃取配置;建议禁用SSO功能;近1.1万台设备受影响。 这样就能在有限的字数内涵盖所有关键信息。 </think> Fortinet确认 CVE-2025-59718 漏洞被绕过,导致已打补丁的防火墙被攻破。攻击者利用该漏洞创建账户并窃取配置。Fortinet 建议禁用 FortiCloud SSO 功能以缓解风险。 2026-1-23 10:45:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

Fortinet

Days after admins began reporting that their fully patched firewalls are being hacked, Fortinet confirmed it's working to fully address a critical FortiCloud SSO authentication bypass vulnerability that should have already been patched since early December.

This comes after a wave of reports from Fortinet customers about threat actors exploiting a patch bypass for the CVE-2025-59718 vulnerability to compromise fully patched firewalls.

Cybersecurity company Arctic Wolf said on Wednesday that the campaign began on January 15, with attackers creating accounts with VPN access and stealing firewall configurations within seconds, in what appear to be automated attacks. It also added that the attacks are very similar to incidents it documented in December, following the disclosure of the CVE-2025-59718 critical vulnerability in Fortinet products.

Wiz

On Thursday, Fortinet finally confirmed these reports, stating that ongoing CVE-2025-59718 attacks match December's malicious activity and that it's now working to fully patch the flaw.

Affected Fortinet customers have also shared logs showing that the attackers created admin users after an SSO login from [email protected] on IP address 104.28.244.114, which match indicators of compromise detected by Arctic Wolf while analyzing ongoing FortiGate attacks and December in-the-wild exploitation, as well as those shared by Fortinet on Thursday.

"Recently, a small number of customers reported unexpected login activity occurring on their devices, which appeared very similar to the previous issue. However, in the last 24 hours, we have identified a number of cases where the exploit was to a device that had been fully upgraded to the latest release at the time of the attack, which suggested a new attack path," said Fortinet Chief Information Security Officer (CISO) Carl Windsor.

"Fortinet product security has identified the issue, and the company is working on a fix to remediate this occurrence. An advisory will be issued as the fix scope and timeline is available. It is important to note that while, at this time, only exploitation of FortiCloud SSO has been observed, this issue is applicable to all SAML SSO implementations."

Fortinet: Restrict admin access, disable FortiCloud SSO

Until Fortinet fully addresses the CVE-2025-59718 vulnerability, Windsor advised customers to restrict administrative access to their edge network devices via the Internet by applying a local-in policy that limits the IP addresses that can access the devices' administrative interfaces.

Admins should also disable the FortiCloud SSO feature on their Fortinet devices by going into System -> Settings -> Switch and toggling off the "Allow administrative login using FortiCloud SSO" option.

Fortinet customers who detect any of the IOCs while checking their devices for post-exploitation evidence are advised to treat "the system and configuration as compromised," rotate credentials (including any LDAP/AD accounts), and restore their configuration with a known clean version.

Internet security watchdog Shadowserver now tracks nearly 11,000 Fortinet devices exposed online that have FortiCloud SSO enabled. CISA also added CVE-2025-59718 to its list of actively exploited vulnerabilities on December 16 and ordered federal agencies to patch within a week.

BleepingComputer reached out to Fortinet several times this week with questions about these ongoing attacks, but the company has yet to respond.

Wiz

The 2026 CISO Budget Benchmark

It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.

Learn how top leaders are turning investment into measurable impact.


文章来源: https://www.bleepingcomputer.com/news/security/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/
如有侵权请联系:admin#unsafe.sh