MDM & Security
Calendar Icon Light V2 - TechVR X Webflow Template
Jan 23, 2026

Fortinet Firewalls Are Getting Hacked Even After Patching CVE-2025-59718 – What UK Businesses Need To Do Now

Fortinet admins report compromises on patched FortiGate devices. CVE-2025-59718 bypass actively exploited. What UK businesses must do now to secure network infrastructure

Critical Fortinet vulnerability persists despite patches. Immediate remediation steps inside.

What's Happening Right Now

Fortinet customers are reporting that FortiGate firewalls already updated to FortiOS 7.4.9 and 7.4.10 are still being compromised. Attackers are exploiting a patch bypass of critical authentication vulnerability CVE-2025-59718, gaining full administrative control even on supposedly "patched" systems.

If your business uses Fortinet firewalls, this is not a routine security update. This is an active incident requiring immediate action.

Quick Facts:

  • Vulnerability: CVE-2025-59718 (CVSS 9.8 – Critical)
  • Attack vector: FortiCloud SSO login authentication bypass
  • Affected products: FortiOS, FortiProxy, FortiWeb, FortiSwitchManager
  • Current status: Patches released (7.4.9, 7.4.10) are NOT fully effective
  • Exploitation: Active in the wild; CISA has added this to Known Exploited Vulnerabilities
  • UK business impact: Over 25,000 Fortinet devices had FortiCloud SSO enabled globally in mid-December 2025

How The Attack Works

The vulnerability stems from improper verification of cryptographic signatures in SAML messages used by FortiCloud single sign-on (SSO). When FortiCloud SSO administrative login is enabled, an unauthenticated attacker can craft a malicious SAML response that grants admin access without valid credentials.

In plain English: your firewall's management interface becomes publicly accessible to anyone who knows how to exploit this flaw.

What attackers are doing:

  1. Exploiting the SSO authentication bypass to log in as administrator
  2. Creating new local admin accounts (commonly named "helpdesk" or similar)
  3. Establishing persistent access to the firewall
  4. Potentially modifying firewall rules, VPN configurations, and routing

This isn't theoretical. UK organisations and international firms are reporting compromises on devices running the supposedly fixed firmware versions.

Why "Patched" Devices Are Still At Risk

Here's the critical part: administrators report successful attacks on FortiGate appliances that had already been upgraded to FortiOS 7.4.9 and 7.4.10. Fortinet has reportedly confirmed the vulnerability persists in version 7.4.10.

This is what security professionals call a patch bypass. The underlying logic flaw in the authentication flow remains exploitable under certain conditions, even after the first round of patches.

Fortinet is preparing fully remediated versions:

  • FortiOS 7.4.11
  • FortiOS 7.6.6
  • FortiOS 8.0.0

Until these versions are released and deployed, organisations with FortiCloud SSO enabled remain at risk.

Who Is Affected

Your organisation is potentially vulnerable if:

  1. You're using FortiGate, FortiProxy, FortiWeb, or FortiSwitchManager
  2. You have FortiCloud SSO administrative login enabled
  3. Your management interface is accessible from the internet (even if you think it's restricted)

Important detail: FortiCloud SSO admin login is often automatically enabled during FortiCare registration unless an administrator explicitly opts out. Many organisations don't realise this feature is active.

Even if you're not using FortiCloud SSO for day-to-day operations, if it's enabled in the configuration, you're exposed.

Immediate Actions For IT Administrators

1. Check If FortiCloud SSO Admin Login Is Enabled

Via GUI:

  • Log into FortiGate web interface
  • Navigate to System → Settings
  • Look for "Allow administrative login using FortiCloud SSO"

Via CLI:

show system global | grep admin-forticloud-sso-login

If this shows enable, you need to act immediately.

2. Disable FortiCloud SSO Admin Login (If Not Required)

Unless you absolutely need FortiCloud SSO for administrator access, turn it off right now.

Via GUI:

  • System → Settings
  • Switch "Allow administrative login using FortiCloud SSO" to Off
  • Apply changes

Via CLI:

config system global
set admin-forticloud-sso-login disable
end

This single configuration change removes the attack vector entirely.

3. Restrict Management Access

Your firewall's management interface should never be accessible from the open internet.

Implement these controls immediately:

  • Limit HTTPS and SSH admin access to dedicated management networks
  • Require VPN connection for remote management
  • Configure IP allowlists for management interfaces
  • Disable management access from WAN interfaces

If you're not certain how your management access is configured, assume it's exposed and audit it now.

4. Review Logs For Signs Of Compromise

Look for:

  • Unexpected FortiCloud SSO logins (particularly from unusual email addresses like cloud-init@mail.io)
  • New local administrator accounts that you didn't create
  • Administrative actions during unusual hours
  • Configuration changes to firewall rules, VPN settings, or admin accounts

Where to check:

  • System → Log & Report → Event Logs
  • Filter for "Admin" events
  • Export logs to your SIEM if you have one

If you don't have centralised logging, set it up. You can't investigate what you haven't recorded.

5. If You Find Evidence Of Compromise

If you discover suspicious activity, assume full device compromise.

Required response steps:

  1. Isolate the device from production (if operationally feasible)
  2. Rotate all credentials:
    • Local administrator accounts
    • FortiCloud SSO accounts
    • API tokens
    • VPN user credentials
    • Any service accounts used by the firewall
  3. Factory reset and rebuild:
    • Backup your current configuration (for forensic analysis, not for restoration)
    • Factory reset the device
    • Restore from a known-good configuration backup from before the compromise
    • Apply the latest available firmware
  4. Document everything for audit and insurance purposes

6. Plan Emergency Maintenance For Final Patches

When Fortinet releases FortiOS 7.4.11, 7.6.6, and 8.0.0, you need to schedule emergency change windows to apply them immediately.

Don't wait for your normal monthly patching cycle. This is a critical, actively exploited vulnerability with proof of concept code in circulation.

7. For Managed Service Providers

If you manage Fortinet infrastructure for multiple clients:

Create a standard incident response runbook:

  1. Inventory all FortiGate, FortiProxy, FortiWeb, and FortiSwitchManager deployments
  2. Check FortiCloud SSO status on each device
  3. Disable SSO where not required
  4. Schedule emergency maintenance windows with all affected clients
  5. Document configuration changes and communication
  6. Monitor for IOCs across your entire managed estate

Your clients are relying on you to protect them. Proactive communication and rapid response separates professional MSPs from order-takers.

Why This Matters For Your Business

1. Active Exploitation Is Documented

This isn't a "maybe someone could exploit this" scenario. CISA (US Cybersecurity and Infrastructure Security Agency) has added CVE-2025-59718 to their Known Exploited Vulnerabilities catalogue and ordered federal agencies to remediate quickly.

UK organisations face similar scrutiny from:

  • Cyber insurers reviewing claims
  • ICO in the event of a data breach
  • Industry regulators (FCA, CQC, etc.)
  • Audit requirements (ISO 27001, Cyber Essentials Plus)

Failing to act on known, actively exploited vulnerabilities becomes increasingly difficult to justify.

2. Firewalls Are Single Points Of Failure

Your firewall sits at the boundary of your network. Compromising it gives an attacker:

  • Visibility into all traffic passing through your network
  • Ability to modify firewall rules to allow additional access
  • Control over VPN configurations and remote access
  • Potential access to internal network segments

A compromised firewall isn't just a security incident. It's a potential business continuity crisis.

3. Cloud SSO Creates New Attack Surfaces

This vulnerability highlights a broader risk: cloud identity integrations on security appliances must be treated as high-risk components, not convenience features.

Many organisations enable SSO for "ease of management" without considering:

  • The additional attack surface it creates
  • The authentication dependencies it introduces
  • The residual risk if SSO providers have vulnerabilities
  • The compliance implications of cloud-based authentication

Convenience and security often compete. Make conscious trade-offs, don't accept defaults.

Broader Lessons For Network Security Management

The Myth Of "Patched Therefore Safe"

This incident demonstrates why patch management alone isn't sufficient security practice.

A comprehensive approach requires:

  1. Configuration hardening: Disable unnecessary features (like FortiCloud SSO if you don't need it)
  2. Defence in depth: Don't rely on firewall authentication as your only control
  3. Continuous monitoring: Detect anomalies even on "secure" systems
  4. Rapid response capability: Fix things in hours, not weeks

Why Management Interfaces Need Special Attention

Your firewall's admin interface is a critical security boundary. Treat it accordingly:

  • Never expose management to the internet (even with "just" IP restrictions)
  • Use dedicated management VLANs separate from production
  • Implement jump boxes for administrative access
  • Log all administrative actions and monitor for anomalies
  • Enforce MFA on administrative accounts (separate from SSO if possible)

If your firewall gets compromised via its management interface, game over.

The Real Value Of Managed Security Services

This is where professional cyber security management services make the difference between quick remediation and business disruption.

What a competent managed cyber security service provider does:

  • Monitors vendor security advisories 24/7
  • Assesses your specific exposure to new vulnerabilities
  • Coordinates emergency patching across your infrastructure
  • Reviews logs for indicators of compromise
  • Implements defence-in-depth controls beyond patching
  • Documents everything for compliance and audit

You're not paying for someone to install updates. You're paying for expertise, vigilance, and rapid response when threats emerge.

What Stabilise Does Differently

We don't just patch firewalls. We architect network security with the assumption that any single control can fail.

Our approach to infrastructure security:

1. Configuration Audits

We review your security appliances (Fortinet, Cisco, UniFi, and others) against CIS benchmarks and vendor hardening guides. This often reveals that features like FortiCloud SSO are enabled unnecessarily, creating avoidable risk.

2. Management Plane Hardening

Your firewall's admin interface gets the same scrutiny as your DMZ. We implement:

  • Dedicated management networks
  • Jump host architecture
  • IP allowlisting
  • Session recording and monitoring
  • Emergency access procedures that don't require internet exposure

3. Layered Monitoring

We don't assume firewalls are invulnerable. Our monitoring watches for:

  • Configuration changes on security appliances
  • New administrative accounts
  • Unusual authentication patterns
  • Changes to firewall rules or routing
  • Traffic anomalies that could indicate compromise

4. Vendor-Agnostic Security Assessment

We're not Fortinet partners, Cisco partners, or Palo Alto partners. We assess your security infrastructure objectively and recommend changes based on your risk profile, not vendor relationships.

If your Fortinet firewall is creating more risk than it mitigates, we tell you.

How To Get Your Fortinet Infrastructure Audited

We're offering UK organisations a Fortinet Firewall Health Check this month:

What we assess:

  1. FortiCloud SSO configuration and exposure
  2. Management interface accessibility audit
  3. Firmware version review against current vulnerabilities
  4. Admin account and authentication review
  5. Logging and monitoring configuration
  6. Compliance with Cyber Essentials Plus requirements

What you receive:

  • Written report of findings
  • Prioritised remediation plan
  • Configuration hardening recommendations
  • Estimated risk reduction from recommended changes

This isn't a sales call disguised as an audit. We document what we find, explain the risks, and provide clear remediation steps whether or not you engage us for implementation.

Book your audit: Contact us or email security@stabilise.io with "Fortinet Audit" in the subject line.

Frequently Asked Questions

Do I need to disable FortiCloud SSO if I'm already on the latest firmware?

If you're running FortiOS 7.4.9 or 7.4.10, yes. Field reports confirm these versions remain vulnerable to the patch bypass. Disable FortiCloud SSO admin login unless you have a specific operational requirement for it.

What if I need FortiCloud SSO for my remote administrators?

Consider alternative approaches:

  • VPN + local authentication
  • Jump host with MFA
  • Dedicated management VPN tunnel

If you must use FortiCloud SSO, implement compensating controls: IP allowlisting, dedicated management VLAN, enhanced monitoring, and immediate upgrade to fixed versions when available.

How do I know if my firewall has already been compromised?

Review authentication logs for:

  • Unrecognised SSO login events
  • New administrator accounts you didn't create
  • Configuration changes during off-hours
  • Multiple failed login attempts followed by successful access

If your logs don't go back far enough, that's a separate problem. Implement 90-day log retention minimum.

Can I just disable internet access to the management interface instead of disabling SSO?

Technically yes, but it's not sufficient. The vulnerability exists in the SSO authentication mechanism. If an attacker gains access to your network through other means (phishing, compromised VPN, supplier access), they could still exploit it internally.

Defence in depth: disable unnecessary features AND restrict management access.

What's the difference between cyber security services and just having a firewall?

A firewall is a tool. Cyber security services involve:

  • Selecting the right tools for your risk profile
  • Configuring them according to security best practices
  • Monitoring them continuously for issues
  • Responding rapidly when vulnerabilities emerge
  • Testing and validating that controls work as intended

You wouldn't buy a defibrillator and consider yourself protected against heart attacks. The tool matters, but expertise in using it matters more.

Should we consider replacing Fortinet entirely?

Not necessarily. Every firewall vendor has vulnerabilities at some point. The question is:

  • How quickly do they respond?
  • How transparent are they about issues?
  • Do you have the expertise to manage their platform securely?

Fortinet makes solid products, but this incident highlights the importance of configuration management and not just relying on vendor defaults.

What does this mean for Cyber Essentials Plus compliance?

Cyber Essentials Plus requires that security patches are applied promptly. With CVE-2025-59718:

  1. If you've disabled FortiCloud SSO, you've mitigated the vulnerability
  2. You must upgrade to fully patched versions when available
  3. Document your actions (what you did, when, and why)

UK assessors will expect evidence you responded to critical vulnerabilities within days, not weeks.

How often should we be reviewing firewall configurations?

Minimum:

  • Quarterly configuration review against vendor hardening guides
  • After any significant change to network or security infrastructure
  • When vendor security advisories recommend configuration changes
  • During annual penetration testing and security audits

If you have a managed cyber security services provider, they should be doing this continuously.

Summary: What To Do Today

If you're responsible for Fortinet infrastructure in a UK business:

  1. Check FortiCloud SSO status on all devices (5 minutes per device)
  2. Disable it if you don't specifically need it (2 minutes per device)
  3. Audit management interface access from the internet (30 minutes)
  4. Review authentication logs for suspicious activity (1 hour)
  5. Schedule emergency maintenance for when 7.4.11/7.6.6/8.0.0 release (now)
  6. Document everything you find and fix (ongoing)

If you don't have the expertise or resources to do this quickly, that's what professional IT support services are for.

This is the difference between reading about security incidents in the news and being in the news about a security incident.

About Stabilise

We're technology advisors who specialise in network security and infrastructure for London businesses. We manage security appliances across Fortinet, Cisco, UniFi, and other platforms, with a focus on configuration hardening and defence-in-depth.

Unlike commodity IT support companies, we employ certified security engineers who understand both the technical details of vulnerabilities like CVE-2025-59718 and the business impact of getting security decisions wrong.

What makes us different:

  • We audit security configurations proactively, not just when incidents occur
  • We implement layered security controls, not just perimeter firewalls
  • We monitor for compromise, not just availability
  • We're transparent about costs, capabilities, and limitations

If you're a London business looking for cyber security management services that go beyond "patch and pray," let's talk.

Last updated: 22 January 2026
Classification: Public security advisory
Sharing: You may share this article with colleagues and industry contacts

Sources:

  • BleepingComputer security reporting
  • VulnCheck technical analysis
  • Arctic Wolf vulnerability research
  • Fortinet security advisories
  • CISA Known Exploited Vulnerabilities catalogue
  • Field reports from UK Fortinet administrators

Need immediate assistance with Fortinet firewall security? Email security@stabilise.io or call our security team on +44 203 355 7522