THREAT ALERT
Tuesday, December 16th, 2025

We are following reports indicating that CVE(s) (CVE-2025-59718 CVE-2025-59719) addressed in Fortinet PSIRT advisory FG-IR-25-647 are being actively exploited.
DefenseStorm is following reports indicating that CVE(s) (CVE-2025-59718 CVE-2025-59719) addressed in Fortinet PSIRT advisory FG-IR-25-647 are being actively exploited in the wild. Organizations using affected Fortinet and/or FortiCloud products should review this advisory.Please see the information below taken directly from Fortiguard Labs from here: https://fortiguard.fortinet.com/psirt/FG-IR-25-647
Summary
An Improper Verification of Cryptographic Signature vulnerability [CWE-347] in FortiOS, FortiWeb, FortiProxy and FortiSwitchManager may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML message, if that feature is enabled on the device.
Please note that the FortiCloud SSO login feature is not enabled in default factory settings. However, when an administrator registers the device to FortiCare from the device’s GUI, unless the administrator disables the toggle switch “Allow administrative login using FortiCloud SSO” in the registration page, FortiCloud SSO login is enabled upon registration.
To prevent being affected by this vulnerability on vulnerable
versions, please turn off the FortiCloud login feature (if enabled) temporarily until upgrading to a non-affected version.
To turn off FortiCloud login, go to System -> Settings -> Switch
“Allow administrative login using FortiCloud SSO” to Off. Or type the following command in the CLI:
config system global
set admin-forticloud-sso-login disable
end

(Image obtained from https://fortiguard.fortinet.com/psirt/FG-IR-25-647)
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool
We strongly recommend that customers review Fortinet’s remediation and mitigation guidance in detail and assess their exposure to see if any impacted products are in use within their environment. As with all vendor advisories, organizations should follow their internal change control and patch management processes when applying updates or configuration changes.
Customers are encouraged to bookmark the Fortinet advisory page and monitor it for updates, as additional details, mitigations, or indicators may be released as the situation evolves.
Our team(s) has identified several indicators of compromise (IOCs) associated with this activity. These IOCs have been incorporated into our ThreatMatch feed to support detection and monitoring efforts.
References
https://fortiguard.fortinet.com/psirt/FG-IR-25-647