Fortinet warns of active FortiCloud SSO bypass affecting updated devices
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得通读一下文章,抓住主要信息。 文章讲的是Fortinet发现FortiCloud SSO认证被绕过,影响到已经更新的设备。攻击者自动化了防火墙设置的更改,添加用户,启用VPN,并窃取配置。这和2025年12月的漏洞类似。Arctic Wolf的研究人员在2026年1月15日之后观察到新的攻击集群,目标是FortiGate设备。攻击者创建通用账户以保持持久性,启用VPN访问,并窃取防火墙配置。Fortinet正在开发修复补丁,并建议用户限制管理员访问和暂时禁用SSO。 接下来,我需要把这些信息浓缩到100字以内。要包括FortiCloud SSO被绕过、影响已更新设备、攻击者行为、与之前漏洞的相似性、以及应对措施。 可能的结构:FortiCloud SSO认证被绕过影响已更新设备,攻击者自动化更改防火墙设置、添加用户、启用VPN并窃取配置,与2025年漏洞类似。修复中,建议限制访问和禁用SSO。 检查一下字数是否在限制内,并确保所有关键点都涵盖。 </think> Fortinet确认 FortiCloud SSO 认证被绕过,影响已更新设备。攻击者自动化更改防火墙设置、添加用户、启用 VPN 并窃取配置。此活动与 2025 年 12 月披露的 SSO 漏洞类似。修复中,建议限制管理员访问并禁用 FortiCloud SSO 作为临时措施。 2026-1-23 18:28:23 Author: securityaffairs.com(查看原文) 阅读量:3 收藏

Fortinet warns of active FortiCloud SSO bypass affecting updated devices

Fortinet confirmed attacks are bypassing FortiCloud SSO authentication, affecting even fully patched devices, similar to recent SSO flaws.

Fortinet confirmed attacks bypass FortiCloud SSO on fully patched devices. Threat actors automate firewall changes, add users, enable VPNs, and steal configs, in campaigns resembling December 2025 exploits of critical FortiCloud SSO flaws.

Arctic Wolf researchers reported a new automated attack cluster observed since January 15, 2026, targeting FortiGate devices. Attackers created generic accounts for persistence, enabled VPN access, and exfiltrated firewall configurations. The activity resembles a December 2025 campaign involving admin SSO logins and config theft. Arctic Wolf has detections in place and is monitoring the evolving threat.

“Starting on January 15, 2026, Arctic Wolf began observing a new cluster of automated malicious activity involving unauthorized firewall configuration changes on FortiGate devices.” reads the report published by Arctic Wolf. “This activity involved the creation of generic accounts intended for persistence, configuration changes granting VPN access to those accounts, as well as exfiltration of firewall configurations. “

In December 2025, Fortinet disclosed two critical SSO authentication bypass flaws, tracked as CVE-2025-59718 and CVE-2025-59719, which are improper verification of cryptographic signature issues.

Threat actors started exploiting the two critical flaws in Fortinet products days after patch release, Arctic Wolf warned.

Arctic Wolf researchers observed attackers began exploiting critical Fortinet authentication bypass flaws on December 12, just three days after patches were issued. The attacks involved malicious SSO logins on FortiGate devices, mainly targeting admin accounts from multiple hosting providers. After gaining access, the attackers exported device configurations via the GUI. These files include hashed credentials, which threat actors can attempt to crack offline, increasing the risk of further compromise.

Recent intrusions show malicious SSO logins from a small set of hosting providers, often targeting the [email protected] account. After successful SSO access, attackers quickly exported firewall configurations via the GUI and created secondary admin accounts for persistence. These actions occurred within seconds, suggesting highly automated activity.

This week, Fortinet confirmed that attacks succeeded even against devices patched for CVE-2025-59718 and CVE-2025-59719.

The company identified a new attack path after observing login exploits on fully updated devices. A fix is in progress, an advisory is pending, and all SAML SSO implementations may be affected.

“Recently, a small number of customers reported unexpected login activity occurring on their devices, which appeared very similar to the previous issue. However, in the last 24 hours, we have identified a number of cases where the exploit was to a device that had been fully upgraded to the latest release at the time of the attack, which suggested a new attack path.” reads the advisory published by the company.

“Fortinet product security has identified the issue, and the company is working on a fix to remediate this occurrence. An advisory will be issued as the fix scope and timeline is available. It is important to note that while, at this time, only exploitation of FortiCloud SSO has been observed, this issue is applicable to all SAML SSO implementations.”

Fortinet is developing a fix, in the meantime, it released IOCs to aid threat hunting. Customers are urged to restrict admin access, limit it to local IPs, and temporarily disable FortiCloud SSO as a workaround.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, SSO)




文章来源: https://securityaffairs.com/187250/security/fortinet-warns-of-active-forticloud-sso-bypass-affecting-updated-devices.html
如有侵权请联系:admin#unsafe.sh