Network administrators who use FortiGate devices have been on for days: what seemed to be a corrected failure in the authentication of FortiCloud SSO (identified as CVE-2025-59718) is again being exploited to take control of firewalls even in equipment with recent patches. User reports and incident analysis indicate that the update announced as a solution did not completely close the access path, allowing attackers to create remote administrative accounts and manage devices as if they had legitimate credentials.
The situation accumulates several signs of gravity: evidence of active exploitation, records shared by managers and the inclusion of vulnerability in official risk lists. In technical forums, several administrators have published records showing the creation of an administrator user after a SSO login from an account identified as cloud-init @ mail.io and IP address 104.28.244.114, a pattern that coincides with incidents previously detected in December. The same administrators indicate that their devices run versions that should have corrected the failure, suggesting that the original patch did not close all the operating vectors.

Fortinet published a technical note on this incident on its security portal (PSIRT), explaining the scope of the problem and the recommended mitigation; it is the official reference to check affected versions and scheduled updates: Fortinet PSIRT - FG-IR-25-647. For its part, the United States Agency for Infrastructure and Cybersecurity (CISA) already added this entry to its catalogue of actively exploited vulnerabilities, forcing federal agencies to implement measures in short time: CISA - Known Exploited Vulnerabilities (CVE-2025-59718).
One factor that increases risk is public exposure of devices with FortiCloud SSO activated. In December, Shadowserver reported that there were more than 25,000 Internet-accessible devices with this enabled feature; since then several thousand have been deactivated, but there are still more than 11,000 potentially accessible equipment from the public network: Shadowserver - FortiCloud SSO exposed.
While Fortinet prepares new versions of the operating system (FortiOS 7.4.11, 7.6.6 and 8.0.0, according to internal communications and management reports) to finally close the failure, the practical and urgent recommendation for those who may be at risk is to temporarily deactivate the possibility of administrative session by FortiCloud SSO. That functionality is not activated by default on devices that are not registered with FortiCare, but on which it is, it can become the gateway that the attackers are taking advantage of.
If you manage FortiGate, you can deactivate the FortiCloud SSO login from the graphical interface by browsing to System → Settings and by putting the "Allow administrative login using FortiCloud SSO" option on Off. If you prefer the command line, the instructions to deactivate it are simple; run the following commands on the device's CLI:
config global system
set admin-forticloud-sso-login disable
end
Disable that option immediately reduces the attack surface but it's not the only reasonable measure. Local users and access records should be audited to detect new accounts or unusual activity, the IMS or centralized management log should be reviewed to track suspicious SSO start-ups, and any equipment that presents signs of commitment should be quarantined. If you detect administrative accounts that you have not created, isolate them and treat the incident as an intrusion: change passwords, revoke compromised keys and certificates and restore the integrity of the device from verified backup before reconnecting to production.

The security community has already documented operating patterns that point to the sending of SAML messages manipulated as a vector for supplanting and creating accounts with privileges. Previous analysis, disseminated by cybersecurity firms, links the December incidents to embryos of the same modus operandi that is now being observed; therefore it is key not only to apply the temporary blockade, but to keep an eye on new official updates of Fortinet and to apply them as soon as they are confirmed as complete.
Finally, while the main mitigation is technical, there is an important operational dimension: to communicate clearly and quickly to the affected teams, to coordinate with the support of the supplier and, where appropriate, to regulatory entities, and to preserve evidence for forensic analysis. Public communication on these incidents is already circulating in specialized forums - for example, managers have published references and log samples in technical threads - and the authorities and response groups are following development. For more context and official source, check the Fortinet notice and the entry of the CISA catalogue mentioned above.
The immediate lesson for security officials is simple but strong: If your FortiGate has FortiCloud SSO enabled, disable it now and monitor unauthorized access signs until Fortinet publishes and verifies a patch that closes all bypass variants.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...