Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住关键点。 文章讲的是Fortinet FortiGate设备被发现的两个安全漏洞,CVE-2025-59718和CVE-2025-59719,CVSS评分都是9.8,属于严重级别。这些漏洞允许未经认证的攻击者通过伪造的SAML消息绕过SSO登录认证。FortiCloud SSO默认是关闭的,但在注册时会自动开启,除非管理员手动关闭。 Arctic Wolf观察到攻击者利用这些漏洞进行恶意SSO登录,主要针对“admin”账户,并在成功登录后导出设备配置。建议用户尽快打补丁,并禁用FortiCloud SSO,限制管理接口访问。 现在我要把这些信息浓缩到100字以内。需要包括:FortiGate设备被攻击、两个漏洞、CVSS评分、攻击方式、影响、建议措施。 可能的结构是:时间+事件+漏洞细节+攻击情况+建议措施。 最后检查字数是否符合要求。 </think> 网络攻击者利用Fortinet FortiGate设备中两个新披露的安全漏洞(CVE-2025-59718和CVE-2025-59719)进行攻击。这些漏洞允许通过伪造的SAML消息绕过单点登录认证。恶意活动涉及针对"admin"账户的非法登录,并导出设备配置。建议用户尽快应用补丁,并禁用FortiCloud SSO以降低风险。 2025-12-16 10:58:0 Author: thehackernews.com(查看原文) 阅读量:7 收藏

Network Security / Vulnerability

Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure.

Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances on December 12, 2025. The attacks exploit two critical authentication bypasses (CVE-2025-59718 and CVE-2025-59719, CVSS scores: 9.8). Patches for the flaws were released by Fortinet last week for FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.

"These vulnerabilities allow unauthenticated bypass of SSO login authentication via crafted SAML messages, if the FortiCloud SSO feature is enabled on affected devices," Arctic Wolf Labs said in a new bulletin.

It's worth noting that while FortiCloud SSO is disabled by default, it is automatically enabled during FortiCare registration unless administrators explicitly turn it off using the "Allow administrative login using FortiCloud SSO" setting in the registration page.

Cybersecurity

In the malicious activity observed by Arctic Wolf, IP addresses associated with a limited set of hosting providers, such as The Constant Company llc, Bl Networks, and Kaopu Cloud Hk Limited, were used to carry out malicious SSO logins against the "admin" account.

Following the logins, the attackers have been found to export device configurations via the GUI to the same IP addresses.

In light of ongoing exploitation activity, organizations are advised to apply the patches as soon as possible. As mitigations, it's essential to disable FortiCloud SSO until the instances are updated to the latest version and limit access to management interfaces of firewalls and VPNs to trusted internal users.

"Although credentials are typically hashed in network appliance configurations, threat actors are known to crack hashes offline, especially if credentials are weak and susceptible to dictionary attacks," Arctic Wolf said.

Fortinet customers who find indicators of compromise (IoCs) consistent with the campaign are recommended to assume compromise and reset hashed firewall credentials stored in the exfiltrated configurations.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/fortinet-fortigate-under-active-attack.html
如有侵权请联系:admin#unsafe.sh