Executive Summary
In January 2026, Fortinet FortiGate devices became the target of a coordinated cyberattack exploiting an authentication bypass vulnerability (CVE-2025-59718) associated with the FortiCloud SSO feature. Attackers accessed vulnerable firewalls, created rogue administrative accounts, and swiftly exfiltrated firewall configuration data using automated tools, demonstrating significant threat actor sophistication. Reports indicated the campaign began on January 15, 2026, and quickly escalated as even patched devices were compromised—suggesting a patch bypass or incomplete remediation. Affected organizations faced exposure of sensitive security configurations and heightened risk of follow-on breaches or lateral movement within their networks.
This incident spotlights the urgent challenges posed by cloud-exposed assets and incomplete vulnerability remediation. It emphasizes the criticality of rapid patch cycles, zero trust principles, and robust monitoring amid a trend of identity and configuration–focused attacks targeting enterprise infrastructure platforms.
Why This Matters Now
Attackers are rapidly exploiting incomplete patches and authentication flaws in widely deployed network devices, enabling unauthorized access and data theft at scale. As organizations increasingly depend on cloud-linked admin features, the urgency to address exposure, enforce segmentation, and close identity-driven attack paths has never been higher.
Attack Path Analysis
Attackers exploited a Fortinet FortiGate authentication bypass vulnerability in the SSO feature to gain initial access to firewall devices. They quickly escalated privileges by creating rogue admin accounts via the exposed SSO. No significant lateral movement was observed, as the attack focused on direct access. Malicious accounts provided attackers an encrypted channel for command and control to automate configuration export. Firewall configurations were exfiltrated over the existing VPN/tunnel, risking sensitive credentials and network mapping. The main impact was exposure of internal firewall configurations and potential for follow-on attacks, with no immediate destructive activity reported.
Kill Chain Progression
Initial Compromise
Description
Exploitation of an authentication bypass vulnerability (CVE-2025-59718) in FortiGate's SSO feature enabled attackers to gain unauthorized access.
Related CVEs
CVE-2025-59718
CVSS 9.8An improper verification of cryptographic signature vulnerability in Fortinet products allows unauthenticated attackers to bypass FortiCloud SSO login authentication via crafted SAML response messages.
Affected Products:
Fortinet FortiOS – 7.6.0 through 7.6.3, 7.4.0 through 7.4.8, 7.2.0 through 7.2.11, 7.0.0 through 7.0.17
Fortinet FortiProxy – 7.6.0 through 7.6.3, 7.4.0 through 7.4.10, 7.2.0 through 7.2. ... , 7.0.0 through ...
Fortinet FortiSwitchManager – 7.2.0 through ... , 7.0.0 through ...
Exploit Status:
exploited in the wildCVE-2025-59719
CVSS 9.8An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb allows unauthenticated attackers to bypass FortiCloud SSO login authentication via crafted SAML response messages.
Affected Products:
Fortinet FortiWeb – 8.0.0, 7.6.0 through ... 4, 7.4.0 through ...
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Techniques selected for initial mapping; expansion to full STIX/TAXII dataset available in GA release.
Exploit Public-Facing Application
Modify Authentication Process: Single Sign-On
Valid Accounts
Create Account: Local Account
Data Manipulation: Stored Data Manipulation
Data from Local System
Automated Exfiltration
Indicator Removal: File Deletion
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Authentication and Access Control for All System Components
Control ID: 8.2.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy & Access Privileges
Control ID: 500.03, 500.07
DORA (Digital Operational Resilience Act) – ICT Security Policies and Procedures
Control ID: Article 9(2)
CISA Zero Trust Maturity Model 2.0 – Strong Authentication and Policy Enforcement
Control ID: Identity Pillar - Authentication
NIS2 Directive – Appropriate Policies for Identity and Access Management
Control ID: Article 21(2)(d)
PCI DSS 4.0 – Logging and Monitoring
Control ID: 10.4.1
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
Critical exposure through Fortinet FortiGate authentication bypass enabling attackers to steal firewall configurations, compromise VPN access, and potentially breach financial data protection controls.
Health Care / Life Sciences
Authentication bypass attacks on FortiGate devices threaten HIPAA compliance, patient data security, and healthcare network segmentation through stolen firewall configurations and unauthorized access.
Government Administration
CISA-catalogued vulnerability exploitation targeting government FortiGate devices enables configuration theft, unauthorized VPN access, and potential compromise of sensitive government communications and data.
Computer/Network Security
Direct impact on cybersecurity infrastructure through automated FortiGate attacks exploiting SSO vulnerabilities, demonstrating critical gaps in network security appliance protection and configuration management.
Sources
- Hackers breach Fortinet FortiGate devices, steal firewall configshttps://www.bleepingcomputer.com/news/security/hackers-breach-fortinet-fortigate-devices-steal-firewall-configs/Verified
- Fortinet FortiOS CVE-2025- ... : Improper Verification of Cryptographic Signaturehttps://nvd.nist.gov/vuln/detail/CVE-2025-59718Verified
- Fortinet Security Advisory FG-IR-25-647https://fortiguard.fortinet.com/psirt/FG-IR-25-647Verified
- CISA Known Exploited Vulnerabilities Catalog Entry for CVE-2025- ... https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59718Verified
- Fortinet Security Advisory FG-IR-25-648https://fortiguard.fortinet.com/psirt/FG-IR-25-648Verified
- CISA Known Exploited Vulnerabilities Catalog Entry for CVE-2025- ... https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59719Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Applying Zero Trust segmentation, strict identity controls, centralized visibility, and egress enforcement would have contained the breach, limited attacker mobility, and prevented or detected unauthorized configuration exports. CNSF capabilities such as microsegmentation, inline IPS, and egress policy enforcement are vital to minimize risk from authentication bypasses and automated exfiltration.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: Attack surface reduction decreases exposure to vulnerable services.
Control: Zero Trust Segmentation
Mitigation: Limits exposure of privileged interfaces to authorized identities only.
Control: East-West Traffic Security
Mitigation: Prevents or restricts attacker movement to other network segments.
Control: Multicloud Visibility & Control
Mitigation: Enhances detection and alerting on anomalous admin session behavior.
Control: Egress Security & Policy Enforcement
Mitigation: Blocks or logs unauthorized outbound transfers of sensitive data.
Blocks follow-on exploit attempts and malicious payloads.
Impact at a Glance
Affected Business Functions
- Network Security Management
- Firewall Configuration
- VPN Access Control
Estimated downtime: 3 days
Estimated loss: $500,000
Unauthorized access to firewall configurations, including network layouts, firewall rules, and potentially hashed passwords, leading to potential network compromise and data breaches.
Recommended Actions
Key Takeaways & Next Steps
- • Immediately disable vulnerable SSO interfaces and enforce least-privilege identity-based segmentation on all critical admin endpoints.
- • Institute multicloud visibility and automated anomaly detection to rapidly identify and respond to rogue account creation or abnormal admin activities.
- • Deploy east-west segmentation and microsegmentation to limit lateral movement from compromised network devices.
- • Enforce stringent egress filtering and data loss prevention controls to block unauthorized exports of sensitive configurations.
- • Integrate inline IPS/Suricata signatures and CNSF distributed enforcement to proactively block exploit attempts and limit attack impact.

