Active Exploits Reported in “Fixed” FortiOS 7.4.9 Firmware by Fortinet Admins

Published:

spot_img

Understanding the Recent Fortinet Single Sign-On Vulnerability: CVE-2025-59718

Network security is an ever-evolving field, and vulnerabilities can emerge even in systems presumed secure. Recently, administrators worldwide were alarmed by reports regarding CVE-2025-59718, a critical vulnerability within Fortinet’s Single Sign-On (SSO) functionality.

Overview of the Vulnerability

Disclosed in December 2025, CVE-2025-59718 presents a severe risk as it allows unauthenticated attackers to bypass authentication on FortiGate firewalls by manipulating Security Assertion Markup Language (SAML) assertions. Fortinet rolled out FortiOS version 7.4.9 as a solution to this problem. However, it appears that this update may not have been fully effective, allowing attackers to exploit previously secure systems.

The Resurgence of the “Zombie” Vulnerability

In just 48 hours following a new wave of reports from community forums, particularly Reddit, it became evident that devices running FortiOS 7.4.9 were experiencing successful breaches. Verified administrators have shared log evidence suggesting unauthorized logins stemming from the FortiCloud SSO.

Victims reported that attackers could gain access even if they weren’t using the SSO feature directly. Upon successfully logging in, these malicious actors typically create a local administrator account, often labeled as “helpdesk” or similar generic names, ensuring their persistence regardless of the SSO flaw.

Technical Confusion and Speculations

The persistence of this issue has led to widespread speculation about the credibility of the patch. Some users claim Fortinet support hinted privately that the vulnerability could still be present, even with the anticipated release of FortiOS version 7.4.10, although no official confirmation has been made public.

The Exploit Mechanism

The exploit leverages the “Allow administrative login using FortiCloud SSO” setting, which is frequently activated by default when FortiGate devices are registered with FortiCloud. This makes it essential for network administrators to approach this vulnerability with caution.

In light of the current threat landscape, security experts recommend adopting a “trust no patch” mindset concerning the SSO feature. Presently, the only reliable workaround that experts agree upon is to disable the vulnerable feature directly through the Command Line Interface (CLI), regardless of the firmware version being utilized.

Administrators should execute the following command on all FortiGate units:

bash
config system global
set admin-forticloud-sso-login disable
end

Indicators of Compromise (IOCs)

Organizations using FortiOS 7.4.x, including the ostensibly secure version 7.4.9, are advised to conduct immediate audits of their system event logs. Focus should be on the following activities:

  1. Unexpected SSO Logins:
    Look for successful logins identified with the method forticloud-sso, especially from unfamiliar public IP addresses.

  2. New User Creation:
    Check for any recent creation of administrator accounts with names such as helpdesk, support, or fortinet-admin.

  3. Configuration Exports:
    Monitor logs for any records indicating a complete system configuration download shortly after such an SSO login has occurred.

Community Response Amid Uncertainty

In the face of waning trust in official patch cycles, the cybersecurity community has taken upon itself the responsibility of disseminating Indicators of Compromise (IOCs) and potential workarounds more rapidly than vendors can issue formal advisories. Given the current circumstances, disabling the SSO feature stands out as an essential preemptive measure for FortiGate device users.

spot_img

Related articles

Recent articles

Malicious PyPI Package Masquerades as SymPy to Install XMRig Miner on Linux Systems

Malicious Python Package Found in PyPI: A New Cryptojacking Threat Overview of the Threat A newly identified malicious package in the Python Package Index (PyPI) is...

Ingram Micro Data Breach: Ransomware Attack Impacts 42,000+ Individuals

Ingram Micro Data Breach: Insights into the Cybersecurity Incident In recent news, Ingram Micro, one of the leading distributors of IT products globally, has confirmed...

1 in 10 UK Businesses Worry They Can’t Survive a Major Cyberattack

Escalating Cyber Threats Facing UK Businesses UK businesses are confronted with an alarming rise in cyber threats, according to a recent survey by Vodafone Business....

500+ Officials Join Webinar on I4C Bank Account Freezing Rules

Navigating the Storm: A Deep Dive into India's Cyber Fraud Response Mechanism On January 21, over 500 professionals—including police officers, bankers, lawyers, prosecutors, and compliance...