#VU119694 Improper verification of cryptographic signature in Fortinet, Inc products - CVE-2025-59718

 

#VU119694 Improper verification of cryptographic signature in Fortinet, Inc products - CVE-2025-59718

Published: December 10, 2025 / Updated: January 9, 2026


Vulnerability identifier: #VU119694
Vulnerability risk: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2025-59718
CWE-ID: CWE-347
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
FortiOS
FortiProxy
FortiSwitch Manager
FortiWeb
Software vendor:
Fortinet, Inc

Description

The vulnerability allows a remote attacker to bypass SSO authentication.

The vulnerability exists due to improper verification of cryptographic signature when handling SAML messages. A remote non-authenticated attacker can bypass the FortiCloud SSO login authentication via a crafted SAML message.

Successful exploitation of the vulnerability requires that the FortiCloud SSO feature is enabled on the device. However, when an administrator registers the device to FortiCare from the device's GUI, unless the administrator disables the toggle switch "Allow administrative login using FortiCloud SSO" in the registration page, FortiCloud SSO login is enabled upon registration.


Remediation

Install updates from vendor's website.

External links