CVE-2025-59718 is a critical CVSS 9.8 authentication bypass in Fortinet FortiOS and FortiProxy. Patch immediately as it is actively exploited in the wild.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| fortiproxy | 7.0.0 | 7.0.22 | vulnerable |
| fortiproxy | 7.2.0 | 7.2.15 | vulnerable |
| fortiproxy | 7.4.0 | 7.4.11 | vulnerable |
| fortiproxy | 7.6.0 | 7.6.4 | vulnerable |
| fortiswitchmanager | 7.0.0 | 7.0.6 | vulnerable |
| fortiswitchmanager | 7.2.0 | 7.2.7 | vulnerable |
| fortios | 7.0.0 | 7.0.18 | vulnerable |
| fortios | 7.2.0 | 7.2.12 | vulnerable |
| fortios | 7.4.0 | 7.4.9 | vulnerable |
| fortios | 7.6.0 | 7.6.4 | vulnerable |
Consult the FortiGuard PSIRT advisory FG-IR-25-647 and apply the recommended firmware updates for FortiOS, FortiProxy, and FortiSwitchManager to resolve the SAML signature verification issue.
Upgrade to the following versions or higher: FortiOS 7.0.18, 7.2.12, 7.4.9, or 7.6.4; FortiProxy 7.0.22, 7.2.15, 7.4.11, or 7.6.4; and FortiSwitchManager 7.0.6 or 7.2.7.
Disable FortiCloud SSO if it is not business-critical, or implement strict firewall policies and Access Control Lists (ACLs) to ensure only trusted IP addresses can reach the management interface and SAML endpoints.
Review system and authentication logs for anomalous SAML login events, specifically successful SSO authentications originating from unexpected geographic locations or unrecognized IP addresses.
Security teams should monitor Fortinet logs for SAML authentication events and cross-reference them with authorized IP addresses. Look for log entries indicating successful logins where the source identity provider metadata appears inconsistent. Inspect network traffic for malformed SAML response payloads targeting administrative interfaces. Additionally, check for unauthorized configuration changes or new administrative accounts created following suspicious SSO login events, as these are common post-exploitation indicators for this specific vulnerability.
Experience superior visibility and a simpler approach to cyber risk management