Cybersecurity Forecast 2026: What to Expect – New Report

CVE-2025-59718

Critical FortiCloud SSO Vulnerability in Fortinet Devices: CVE-2025-59718 Analysis

CVSS Gauge
CVSS Needle

Summary

CVE-2025-59718 is a critical Fortinet FortiCloud SSO flaw that lets attackers gain admin access using crafted SAML messages. Exploitation has been seen in the wild, including rogue admin creation and firewall config theft. Fortinet issued updates and advises disabling FortiCloud SSO until fully patched.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-59718?

Technical Overview

How Does the CVE-2025-59718 Exploit Work?

The attack typically follows these steps:

CVE-2025-59718

What Causes CVE-2025-59718?

Vulnerability Root Cause:

The issue is caused by weak signature checks in FortiCloud SSO. Fortinet devices don’t properly verify SAML responses, so crafted messages can bypass SSO and give attackers admin access without credentials.

How Can You Mitigate CVE-2025-59718?

If immediate patching is delayed or not possible:  

  • Temporarily disable FortiCloud SSO admin login.
  • Limit firewall and VPN access to trusted networks. 
  • Check logs for unusual SSO logins or new admin accounts. 
  • Assume credential exposure if compromise indicators are found and reset all affected administrative credentials immediately. 
  • Monitor for configuration export activity, as attackers have been observed downloading full firewall configurations shortly after gaining access. 

Which Assets and Systems Are at Risk?

Will Patching CVE-2025-59718 Cause Downtime?

Patch application impact: Fix the issue by updating Fortinet firmware; a reboot may cause brief, planned downtime.

Mitigation (if immediate patching is not possible): Temporarily disable FortiCloud SSO and limit management access; full protection needs official patches.

How Can You Detect CVE-2025-59718 Exploitation?

Remediation & Response

CVSS Breakdown Table

MetricValue Description
Base Score9.8High severity, indicating critical impact and exploitability
Attack Vector NetworkThe vulnerability can be exploited remotely over a network connection
Attack ComplexityLowExploitation does not depend on special conditions or complex steps
Privileges RequiredNoneNo authentication or prior access is needed to carry out the attack
User InteractionNoneThe exploit does not require any user action to succeed
ScopeUnChangedThe impact remains within the affected component and does not extend beyond it
Confidentiality ImpactHighSuccessful exploitation can expose sensitive or protected information
Integrity ImpactHighAn attacker can alter data or bypass security controls
Availability ImpactHighThe vulnerability can significantly disrupt or degrade system availability

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.