
Redazione RHC : 16 December 2025 06:51
Threat actors began actively exploiting the high-severity vulnerabilities shortly after the vendor disclosed them to bypass authentication on FortiGate devices.
A recent report from Arctic Wolf reveals that, as of December 12, 2025, these vulnerabilities are being exploited by attackers to gain administrator access through Single Sign-On (SSO) and steal sensitive system configurations.
The vulnerabilities CVE-2025-59718 and CVE-2025-59719, with a critical CVSS score of 9.1, are targeted by attacks. Without a key, an unauthenticated attacker can gain entry through the front door by exploiting these vulnerabilities, which allow them to bypass SSO protections using spoofed SAML messages.
Arctic Wolf researchers noted: “However, when administrators enroll devices using FortiCare via the GUI, FortiCloud SSO is enabled upon enrollment unless the ‘Allow administrative access via FortiCloud SSO’ setting is disabled on the enrollment page.”
The intrusion attempts observed by Arctic Wolf follow a specific pattern. The attackers originate from specific hosting providers, including The Constant Company LLC, Bl Networks, and Kaopu Cloud Hk Limited , and directly target the administrator account.
| IOC | Hosting Provider |
| 45.32.153[.]218 | The Constant Company LLC |
| 167.179.76[.]111 | The Constant Company LLC |
| 199.247.7[.]82 | The Constant Company LLC |
| 45.61.136[.]7 | Bl Networks |
| 38.54.88[.]203 | Kaopu Cloud Hk Limited |
| 38.54.95[.]226 | Kaopu Cloud Hk Limited |
| 38.60.212[.]97 | Kaopu Cloud Hk Limited |
Once inside, the attackers immediately turned to data theft. “Following malicious SSO logins, configurations were exported to the same IP addresses via the graphical user interface.” This exfiltration is catastrophic because firewall configurations often contain hashed credentials for VPN users and other local accounts.
Administrators are advised to immediately update to the latest patched versions (for example, FortiOS 7.6.4, 7.4.9, 7.2.12, or 7.0.18). For those unable to apply the patch immediately, there is a crucial workaround. You can disable the vulnerable functionality via the command line interface (CLI):
Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.
Redazione