Fortinet warns of critical FortiCloud SSO login auth bypass flaws
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内。首先,我需要仔细阅读文章,抓住主要信息。 文章主要讲的是Fortinet发布了安全更新,修复了两个关键漏洞。这些漏洞存在于FortiOS、FortiWeb、FortiProxy和FortiSwitchManager中。攻击者可以利用这些漏洞绕过FortiCloud的SSO认证。这两个漏洞的CVE编号分别是CVE-2025-59718和CVE-2025-59719,是由于对加密签名验证不当导致的。 另外,文章提到这两个漏洞默认情况下并不启用,只有在设备注册到FortiCare时才会启用。管理员可以通过关闭相关设置来临时禁用FortiCloud登录功能,直到升级到安全版本。 还有其他几个漏洞也被修复了,比如密码更改和使用哈希认证的问题。最后,文章还提到了这些漏洞常被用于勒索软件和网络间谍攻击的例子。 现在,我需要把这些信息浓缩到100字以内。重点包括: Fortinet修复了两个关键漏洞,允许攻击者绕过SSO认证;默认情况下不启用;管理员应禁用相关功能;还有其他漏洞被修复;以及这些漏洞常被利用的情况。 确保语言简洁明了,不使用“文章内容总结”之类的开头。 </think> Fortinet修复了 FortiOS、FortiWeb 等产品中的两个关键漏洞(CVE-2025-59718 和 CVE-2025-59719),这些漏洞可能使攻击者绕过 FortiCloud SSO 认证。默认情况下该功能未启用,管理员可暂时禁用 FortiCloud 登录以防止攻击。此外,还修复了其他安全问题,包括密码重置和哈希认证漏洞。这些漏洞常被用于勒索软件和网络间谍攻击。 2025-12-9 18:45:22 Author: www.bleepingcomputer.com(查看原文) 阅读量:16 收藏

Fortinet

Fortinet has released security updates to address two critical vulnerabilities in FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager that could allow attackers to bypass FortiCloud SSO authentication.

Threat actors can exploit the two security flaws tracked as CVE-2025-59718 (FortiOS, FortiProxy, FortiSwitchManager) and CVE-2025-59719 (FortiWeb) by abusing improper verification of cryptographic signature weaknesses in vulnerable products via a maliciously crafted SAML message.

However, as Fortinet explained in an advisory published today, the vulnerable FortiCloud feature is not enabled by default when the device is not FortiCare-registered.

"Please note that the FortiCloud SSO login feature is not enabled in default factory settings," Fortinet said. "However, when an administrator registers the device to FortiCare from the device's GUI, unless the administrator disables the toggle switch 'Allow administrative login using FortiCloud SSO' in the registration page, FortiCloud SSO login is enabled upon registration."

To protect their systems against attacks exploiting these vulnerabilities, admins are advised to temporarily disable the FortiCloud login feature (if enabled) until they upgrade to a non-vulnerable version.

To disable FortiCloud login, navigate to System -> Settings and switch "Allow administrative login using FortiCloud SSO" to Off. Alternatively, you can run the following command from the command-line interface:

config system global
set admin-forticloud-sso-login disable
end

Today, the company also patched an unverified password change vulnerability (CVE-2025-59808) that allows attackers "who gained access to a victim's user account to reset the account credentials without being prompted for the account's password," and another one that can let threat actors authenticate using the hash in place of the password (CVE-2025-64471).

Fortinet security vulnerabilities are frequently exploited (often as zero days) in both ransomware and cyber-espionage attacks.

For instance, Fortinet disclosed in February that the Chinese Volt Typhoon hacking group backdoored a Dutch Ministry of Defence military network using custom Coathanger remote access trojan (RAT) malware after exploiting two FortiOS SSL VPN flaws (CVE-2023-27997 and CVE-2022-42475).

More recently, in August, Fortinet patched a command injection vulnerability (CVE-2025-25256) with publicly available exploit code in its FortiSIEM security monitoring solution, one day after cybersecurity company GreyNoise reported a massive spike in brute-force attacks targeting Fortinet SSL VPNs.

In November, Fortinet warned of a FortiWeb zero-day (CVE-2025-58034) that was actively exploited in attacks, one week after confirming that it had silently patched another massively exploited FortiWeb zero-day (CVE-2025-64446).

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/
如有侵权请联系:admin#unsafe.sh