SB2025121064 - FortiCloud SSO login authentication bypass in Fortinet products 



SB2025121064 - FortiCloud SSO login authentication bypass in Fortinet products

Published: December 10, 2025 Updated: January 9, 2026

Security Bulletin ID SB2025121064
Severity
Critical
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Improper verification of cryptographic signature (CVE-ID: CVE-2025-59718)

The vulnerability allows a remote attacker to bypass SSO authentication.

The vulnerability exists due to improper verification of cryptographic signature when handling SAML messages. A remote non-authenticated attacker can bypass the FortiCloud SSO login authentication via a crafted SAML message.

Successful exploitation of the vulnerability requires that the FortiCloud SSO feature is enabled on the device. However, when an administrator registers the device to FortiCare from the device's GUI, unless the administrator disables the toggle switch "Allow administrative login using FortiCloud SSO" in the registration page, FortiCloud SSO login is enabled upon registration.


2) Improper verification of cryptographic signature (CVE-ID: CVE-2025-59719)

The vulnerability allows a remote attacker to bypass SSO authentication.

The vulnerability exists due to improper verification of cryptographic signature when handling SAML messages. A remote non-authenticated attacker can bypass the FortiCloud SSO login authentication via a crafted SAML message.

Successful exploitation of the vulnerability requires that the FortiCloud SSO feature is enabled on the device. However, when an administrator registers the device to FortiCare from the device's GUI, unless the administrator disables the toggle switch "Allow administrative login using FortiCloud SSO" in the registration page, FortiCloud SSO login is enabled upon registration.


Remediation

Install update from vendor's website.