Published: Thu 11 December, 2025
Prepared by: Adam Skupien, Vulnerability Security Analyst
Two (2) Critical authentication bypass vulnerabilities have been disclosed in multiple Fortinet products, tracked as CVE-2025-59718 and CVE-2025-59719. These flaws affect FortiOS, FortiProxy, FortiSwitchManager and FortiWeb when FortiCloud SSO login is enabled, and are rated CVSS 9.8 (Critical).
The Australian Cyber Security Centre (ACSC) has issued a Critical alert and recommends immediate patching and investigation for potential compromise.
CVE-2025-59718 – FortiOS, FortiProxy, FortiSwitchManager
CVE-2025-59719 – FortiWeb
These issues only affect devices where “Allow administrative login using FortiCloud SSO” is enabled. Fortinet notes this feature is not enabled by default, but it is automatically enabled when devices are registered to FortiCare unless the toggle is explicitly disabled during registration.
Affected products and versions
FortiOS
FortiProxy
FortiSwitchManager
FortiWeb
Successful exploitation of these vulnerabilities allows unauthenticated remote attackers to bypass FortiCloud SSO login and obtain administrative access to affected Fortinet devices. This can lead to:
While Fortinet has not yet reported in-the-wild exploitation for these two specific CVEs, similar Fortinet authentication bypass issues (e.g. CVE-2024-55591) have been heavily exploited as zero-days in previous campaigns, reinforcing the need for rapid remediation.
If immediate patching is not possible, Disable FortiCloud SSO login on all affected devices where it is enabled. This should be treated as a short-term risk reduction only. Devices must still be upgraded to fixed versions.
To turn off FortiCloud login, go to System -> Settings -> Switch
"Allow administrative login using FortiCloud SSO" to Off.
Alternatively, type the following command in the CLI:
config system global
set admin-forticloud-sso-login disable
end
Harden management access
Regardless of patch status:
Logging & telemetry
Ensure FortiOS, FortiProxy, FortiSwitchManager and FortiWeb logs – along with relevant firewall, proxy, VPN and IdP logs – are forwarded to a SIEM or other central security monitoring platform.
Use these logs to detect:
Administrative logins via FortiCloud SSO from unusual IPs, geolocations or at unusual times.
Sudden spikes in failed vs successful SSO attempts.
Unauthorised configuration changes, new admin accounts or changes to SAML / identity-provider settings.
Correlate Fortinet events with upstream network logs to identify suspicious access to Fortinet management interfaces, especially from external or previously unseen hosts.
If compromise is suspected
MDR customers: Triskele Labs is actively tuning detections for behaviour consistent with exploitation of CVE-2025-59718 / CVE-2025-59719 and related Fortinet authentication bypass activity across supported log sources.
Vulnerability Management customers: Environments are being assessed for vulnerable Fortinet versions; any exposure will be communicated through priority channels.