Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
TM RedHotCyber 970x120 042543
FortiGate and FortiCloud SSO: When Patches Don’t Really Close the Door

FortiGate and FortiCloud SSO: When Patches Don’t Really Close the Door

23 January 2026 15:12

A widespread and dangerous belief has been circulating in the security world for years: “if it’s patched, it’s safe” . The case of FortiCloud SSO administrative access to FortiGate devices demonstrates, once again, how this statement is not only incomplete, but in some contexts profoundly misleading.

From December 2025 to today, we are in fact observing real-world compromises of perfectly updated FortiGate firewalls , characterized by malicious configuration changes , creation of persistent administrative accounts , and exfiltration of configuration files . All this without resorting to new zero-days or particularly noisy attack techniques.

The vector is not unknown. It is known, documented, and—most importantly— still operational : FortiCloud SSO .

December 2025 – CVEs “closed” (at least on paper)

In early December 2025, two critical vulnerabilities were disclosed:

Both enable an authentication bypass in the FortiCloud SSO mechanism , allowing an unauthenticated remote actor to gain administrative access to FortiOS devices when cloud SSO is enabled.

Fortinet released the official patches on December 9, 2025 , assigning the vulnerabilities a CVSS 9.8 . The message was clear: update immediately. But, as often happens, operational reality followed a different path.

Mid-December 2025 – First signs of active exploitation

According to researchers at Arctic Wolf , malicious SSO login activity begins appearing almost immediately after public disclosure , in some cases before many organizations have a chance to patch .

This is a crucial step, because it marks a watershed moment: cloud management becomes a privileged access vector , independent from the traditional exposure of local management interfaces.

January 2026 – The attack shifts gear (and becomes industrial)

From January 15, 2026 , again according to Arctic Wolf , the phenomenon will evolve clearly: no longer isolated events, but a structured and automated campaign .

The observed pattern is as follows:

  1. Administrative access via FortiCloud SSO
  2. Instant creation of new admin accounts with generic names (secadmin, backup, audit, remoteadmin)
  3. Editing firewall policies
  4. Enabling VPN access
  5. Complete configuration exfiltration

This all happens in a few seconds , with a sequence that clearly suggests the use of scripts to automate the attack.

Firewalls patched, but still compromised

Arctic Wolf makes it clear in no uncertain terms:

It is not known at this time whether the latest threat activity observed is fully covered by the patch that initially addressed CVE-2025-59718 and CVE-2025-59719.

This explains why many affected organizations claim to have:

  • updated firmware
  • no zero-day exploits detected
  • no brute force evident in the logs

Yet the firewall is modified ” from the inside” , with administrative privileges.

FortiCloud SSO: From Utility to Attack Surface

FortiCloud SSO was created to simplify management and support activities and is, in the perception of many administrators, a reliable and secure tool by definition , because it is provided directly by the vendor and natively integrated into the product.

Precisely for this reason, when it remains active without adequate hardening, it tends not to be treated as a truly critical administrative access channel .

In fact, FortiCloud SSO exposes cloud-based access with elevated privileges, often not limited by IP address, rarely subject to stringent controls, and, above all, less monitored than traditional local management interfaces. Not because it is considered “weak,” but because it is perceived as intrinsically trusted .

The result is that the attacker doesn’t have to force access : he uses it.

And it is precisely this apparent legitimacy , combined with the implicit trust in the cloud channel, that makes the vector so effective and difficult to identify during the detection phase.

The numbers: real exposure, not theoretical

Data from the Shadowserver Foundation helps put the scale of the problem into perspective:

We’re not talking about test environments or forgotten labs. We’re talking about perimeter firewalls in production , often in enterprise, MSP, and public administration contexts.

Indicators of Compromise (IoC) and Operational Workaround

For Indicators of Compromise (IoCs) associated with this campaign — including malicious SSO login patterns, persistent administrative account creation, configuration change sequences, and exfiltration events — please refer directly to the technical analysis published by Arctic Wolf , which provides a detailed and up-to-date list based on real-world observations.

Given the rapidly evolving nature of the activity and the automated nature of the attacks, relying on the primary source helps avoid duplication and keep detection aligned with the most recent indicators.

From an immediate mitigation perspective, Fortinet has provided a temporary workaround for the CVE-2025-59718 and CVE-2025-59719 vulnerabilities, which is also relevant in light of the activity currently observed, involving administrative access via FortiCloud SSO.

If FortiCloud SSO is enabled , it may be appropriate to temporarily disable it until definitive remediation guidance is available.

Disabling FortiCloud SSO from the CLI

 config system global set admin-forticloud-sso-login disable end So long as config system global set admin-forticloud-sso-login disable end

Since the initial login mechanism is not yet fully understood , it is not possible to state with certainty that this workaround is fully effective against all variants of the ongoing campaign . However, disabling cloud SSO significantly reduces the attack surface and disrupts one of the main vectors observed so far.

Pending further clarification from the vendor, reducing exposure remains the most rational measure , to be combined with auditing activities, log monitoring, and reviewing administrative access.

Because patches alone are no longer enough

This case highlights a broader, structural problem: the attack surface has shifted to cloud management , “legitimate” access has become the new vector, and the obsessive focus on CVEs obscures the configurable risk.

The FortiGate / FortiCloud SSO case is not an anomaly. It’s a clear sign of how cloud management is becoming the new perimeter to defend . Attacks no longer come from exploits alone. They come from forgotten logins , from services left running , from blind reliance on patching. And as often happens, Shadowserver numbers arrive long before incident reports .

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Luca Stivali 300x300
Cyber Security Enthusiast and entrepreneur in the IT industry for 25 years, expert in network design and management of complex IT systems. Passion for a proactive approach to cyber security: understanding how and what to protect yourself from is crucial.
Areas of Expertise: Cyber Threat Intelligence, Security Architecture, Awareness