Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

Arctic Wolf Observes Malicious SSO Logins on FortiGate Devices Following Disclosure of CVE-2025-59718 and CVE-2025-59719

On December 12, 2025, Arctic Wolf began observing intrusions involving malicious SSO logins on FortiGate appliances.
Arctic Wolf Security Bulletin
6 min read

On December 12, 2025, Arctic Wolf began observing intrusions involving malicious SSO logins on FortiGate appliances. Fortinet had previously released an advisory for two critical authentication bypass vulnerabilities (CVE-2025-59718 and CVE-2025-59719) on December 9, 2025. Arctic Wolf had also sent out a security bulletin for the vulnerabilities shortly thereafter. 

These vulnerabilities allow unauthenticated bypass of SSO login authentication via crafted SAML messages, if the FortiCloud SSO feature is enabled on affected Devices. Several product lines were reported to be affected, including FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager. 

In their recent advisory, Fortinet stated that FortiCloud SSO login is disabled by default in factory settings. However, when administrators register devices using FortiCare through the GUI, FortiCloud SSO is enabled upon registration unless the “Allow administrative login using FortiCloud SSO” setting is disabled on the registration page. 

Technical Details

In recently observed intrusions, malicious SSO logins on FortiGate devices originated from a handful of hosting providers, listed in the table below.

IOC  Hosting Provider 
45.32.153[.]218  The Constant Company llc 
167.179.76[.]111  The Constant Company llc 
199.247.7[.]82  The Constant Company llc 
45.61.136[.]7  Bl Networks 
38.54.88[.]203  Kaopu Cloud Hk Limited 
38.54.95[.]226  Kaopu Cloud Hk Limited 
38.60.212[.]97  Kaopu Cloud Hk Limited 

 

Malicious logins were typically against the admin account, as shown in the example log line below: 

date=2025-12-12 time=REDACTED devname=REDACTED devid=REDACTED eventtime=REDACTED tz=REDACTED logid="0100032001" type="event" subtype="system" level="information" vd="root" logdesc="Admin login successful" sn=REDACTED user="admin" ui="sso(199.247.7[.]82)" method="sso" srcip=199.247.7[.]82 dstip=REDACTED action="login" status="success" reason="none" profile="super_admin" msg="Administrator admin logged in successfully from sso(199.247.7[.]82)"

Following malicious SSO logins, configurations were exported to the same IP addresses via the GUI interface. 

date=2025-12-12 time=REDACTED devname=REDACTED devid=REDACTED eventtime=REDACTED tz=REDACTED logid="0100032095" type="event" subtype="system" level="warning" vd="root" logdesc="Admin performed an action from GUI" user="admin" ui="GUI(199.247.7[.]82)" action="download" status="success" msg="System config file has been downloaded by user admin via GUI(199.247.7[.]82)"

Note: Arctic Wolf has detections in place to identify potential exploitation and will continue to alert customers if additional instances are identified. 

Recommendations

Reset Firewall Credentials if Affected

Although credentials are typically hashed in network appliance configurations, threat actors are known to crack hashes offline, especially if credentials are weak and susceptible to dictionary attacks. 

If you observe malicious activity similar to the malicious logs described in this security bulletin, assume that hashed firewall credentials stored in the exfiltrated configurations have been compromised, and reset those credentials as soon as possible. 

Limit Access to Management Interfaces of Firewall and VPN Appliances to Trusted Internal Users

Threat actors commonly target management interfaces of firewalls and VPNs for mass exploitation, often relying on specialized search engines that facilitate identification of specific hardware configurations. 

In the last few years, Arctic Wolf observed multiple campaigns targeting management interfaces on firewalls and VPN gateways. Consider restricting all firewall management interface access to trusted internal networks as a security best security practice across all firewall configurations, regardless of network appliance vendor. 

Upgrade to Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest fixed version of affected Fortinet products. 

Product  Affected Version  Fixed Version 
FortiOS 7.6  7.6.0 through 7.6.3  7.6.4 or above 
FortiOS 7.4  7.4.0 through 7.4.8  7.4.9 or above 
FortiOS 7.2  7.2.0 through 7.2.11  7.2.12 or above 
FortiOS 7.0  7.0.0 through 7.0.17  7.0.18 or above 
FortiProxy 7.6  7.6.0 through 7.6.3  7.6.4 or above 
FortiProxy 7.4  7.4.0 through 7.4.10  7.4.11 or above 
FortiProxy 7.2  7.2.0 through 7.2.14  7.2.15 or above 
FortiProxy 7.0  7.0.0 through 7.0.21  7.0.22 or above 
FortiSwitchManager 7.2  7.2.0 through 7.2.6  7.2.7 or above 
FortiSwitchManager 7.0  7.0.0 through 7.0.5  7.0.6 or above 
FortiWeb 8.0  8.0.0  8.0.1 or above 
FortiWeb 7.6  7.6.0 through 7.6.4  7.6.5 or above 
FortiWeb 7.4  7.4.0 through 7.4.9  7.4.10 or above 

 

Note: The following products are unaffected by the vulnerabilities: FortiOS 6.4, FortiWeb 7.0, and FortiWeb 7.2. 

Workaround 

Fortinet recommends turning off the FortiCloud login feature (if enabled) temporarily until upgrading to a non-affected version. 

To turn off FortiCloud login, go to System -> Settings -> Switch “Allow administrative login using FortiCloud SSO” to Off. 

Or type the following command in the CLI: 

config system global
set admin-forticloud-sso-login disable
end

References

 

Share this post: