New route of attack on FortiCloud SSO detected by Fortinet could skip authentication

Published 4 min de lectura 148 reading

Fortinet has recognized that it is investigating a new attack vector that allows SSO authentication to be skipped on devices using FortiCloud, even on devices that had been recently updated. In recent days the company detected malicious accesses that did not respect the previously applied corrections to two assigned vulnerabilities such as CVE-2025-59718 and CVE-2025-59719, suggesting that the attackers have found an alternative route to authenticate sessions without going through the legitimate flow of SAML.

The reported incidents show a clear pattern: intruders that log in through the FortiCloud SSO mechanism, create generic accounts to maintain persistent access, modify the configuration to enable them to connect with VPN and extract firewall settings to external servers. Account names observed by researchers include "cloud-noc @ mail.io" and "cloud-init @ mail.io", labels that serve to track the activity and check if a device has been compromised.

New route of attack on FortiCloud SSO detected by Fortinet could skip authentication
Image generated with IA.

It's important to understand why this is serious. SAML (Security Assertion Markup Language) is a widely used standard for delegating authentication between identity providers and services; when that mechanism fails, an attacker can supplant administrators without valid credentials. If you want to deepen how SAML works and why any failure in its implementation can have extensive consequences, there are good technical explanations in official OASIS documentation and in informative analyses such as Cloudflare: SAML v2.0 (OASIS) specification and practical explanation of SAML by Cloudflare.

Fortinet has published a public analysis of this campaign and the exploitation of the SSO that it is actively studying and mitigating; its technical report details the findings and the time measures recommended by the manufacturer. You can see that note on your official blog to see the information directly from the source: SSO abuse analysis in FortiOS (Fortinet). In addition, the related vulnerabilities are recorded in the CVE public lists for technical reference: CVE-2025-59718 and CVE-2025-59719.

While Fortinet works to completely close the new route of attack, there are several urgent actions that organizations with FortiGate devices should take. First of all, it is appropriate to reduce the administrative exposure of equipment to the Internet by implementing local access policies and by limiting the direction of management ports. Another practical measure is to temporarily disable the FortiCloud SSO login - the option identified as admin-forticloud-sso-login- until it is confirmed that the correction covers the new vector. It is also critical to audit existing administrative accounts, seek the presence of the names observed by researchers and review changes in VPN policies and configuration exports that may indicate exfiltration.

In addition to the specific measures, it is appropriate to adopt detection and containment measures: to review authentication and system records to detect unusual SSO login, to apply alerts for the creation of administrative accounts and the modification of remote access rules, and, if commitment is confirmed, to isolate the affected devices and restore configurations from pre-incident backup. We must not forget to strengthen the general position: apply multifactor authentication where possible, rotate credentials and maintain a rigorous inventory and change control for edge devices.

New route of attack on FortiCloud SSO detected by Fortinet could skip authentication
Image generated with IA.

This incident also leaves a broader teaching: although the observed exploitation has focused on FortiCloud SSO, the failures in SAML implementations can affect any supplier or product that depends on this standard for the single login. This is why it is recommended that corporate security teams review all SAML integrations that have deployed, analyse the possibility of assertions supplanting attacks and consult publications from their suppliers and cybersecurity agencies for specific measures.

The situation continues to evolve and Fortinet has indicated that it is deploying additional corrections to close the new track of attack detected. Keeping informed with the supplier's official communications and public security alerts is key to responding quickly. For technical follow-up and official recommendations review the manufacturer's statement and the above mentioned CVE entries.

If you manage FortiGate on your network and have not taken any of these measures, act as soon as possible: limit administrative access from the Internet, disable the FortiCloud SSO if it is not necessary and monitor commitment signals. In a world where unique authentication tools gain ground, the security of their implementation is as strong as the weakest of their integrations.

Coverage

Related

More news on the same subject.