FortiGate firewalls hit by silent SSO intrusions and config theft
(2026/01/22)
- Reference: 1769098026
- News link: https://www.theregister.co.uk/2026/01/22/fortigate_firewalls_hit_by_silent/
- Source link:
FortiGate firewalls are getting quietly reconfigured and stripped down by miscreants who've figured out how to sidestep SSO protections and grab sensitive settings right out of the box.
That's according to a [1]warning from security shop Arctic Wolf , which says it has spotted a wave of automated malicious activity starting January 15 that's targeting Fortinet's FortiGate appliances via compromised SSO accounts, flipping firewall settings, creating backdoor admin users, and exfiltrating configuration files.
Arctic Wolf says that the attackers aren't just poking around: intruders create new admin accounts, adjust VPN and firewall rules, and export the full configuration. Those configs often include sensitive credentials and internal network details, effectively handing attackers a map of what to hit next.
[2]
"All of the above events took place within seconds of each other, indicating the possibility of automated activity," Arctic Wolf said.
[3]
[4]
What Arctic Wolf hasn't confirmed is a new vulnerability. Instead, the behavior lines up uncomfortably well with exploitation. This activity stemmed from two critical authentication bypass bugs ( [5]CVE-2025-59718 and CVE-2025-59719) that let attackers bypass SSO login checks via specially crafted SAML responses. Patches for those were shipped last December, but Arctic Wolf's advisory follows a growing wave of reports from administrators who believe attackers are exploiting a patch bypass for CVE-2025-59718 to compromise firewalls that were already thought to be fixed.
On [6]Reddit , affected admins say Fortinet has privately acknowledged that FortiOS 7.4.10 does not fully remediate the SSO authentication bypass, despite the issue being flagged as patched with the release of FortiOS 7.4.9 in early December. Several customers report seeing intrusions on fully updated systems.
[7]Palo Alto kit sees massive surge in malicious activity amid mystery traffic flood
[8]Firewalls and VPNs are so complex now, they can actually make you less secure
[9]Fortinet 'fesses up to second 0-day within a week
[10]Another bad week for SonicWall as SMA 1000 zero-day under active exploit
Fortinet is now said to be preparing additional releases – FortiOS 7.4.11, 7.6.6, and 8.0.0 – over the coming days to fully address CVE-2025-59718.
Logs shared by affected customers show attackers logging in via SSO from the address cloud-init@mail.io, originating from IP address 104.28.244.114, before creating new admin users. Those indicators match the same activity that Arctic Wolf observed while analyzing the current FortiGate attacks, as well as similar exploitation attempts back in December.
[11]
Arctic Wolf is urging organizations to audit FortiGate admin accounts, review recent configuration changes, rotate credentials, and keep a close eye on SSO activity until Fortinet's next round of fixes lands. ®
Get our [12]Tech Resources
[1] https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aXJXv9Vzn-LdNQvyUi_1BAAAAwc&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXJXv9Vzn-LdNQvyUi_1BAAAAwc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aXJXv9Vzn-LdNQvyUi_1BAAAAwc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[5] https://www.theregister.com/2025/12/09/december_2025_patch_tuesday/
[6] https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/
[7] https://www.theregister.com/2025/11/20/palo_alto_traffic_flood/
[8] https://www.theregister.com/2025/10/28/cisco_citrix_vpn_ransomware/
[9] https://www.theregister.com/2025/11/19/fortinet_confirms_second_fortiweb_0day/
[10] https://www.theregister.com/2025/12/18/sonicwall_sma_1000_0day/
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXJXv9Vzn-LdNQvyUi_1BAAAAwc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[12] https://whitepapers.theregister.com/
That's according to a [1]warning from security shop Arctic Wolf , which says it has spotted a wave of automated malicious activity starting January 15 that's targeting Fortinet's FortiGate appliances via compromised SSO accounts, flipping firewall settings, creating backdoor admin users, and exfiltrating configuration files.
Arctic Wolf says that the attackers aren't just poking around: intruders create new admin accounts, adjust VPN and firewall rules, and export the full configuration. Those configs often include sensitive credentials and internal network details, effectively handing attackers a map of what to hit next.
[2]
"All of the above events took place within seconds of each other, indicating the possibility of automated activity," Arctic Wolf said.
[3]
[4]
What Arctic Wolf hasn't confirmed is a new vulnerability. Instead, the behavior lines up uncomfortably well with exploitation. This activity stemmed from two critical authentication bypass bugs ( [5]CVE-2025-59718 and CVE-2025-59719) that let attackers bypass SSO login checks via specially crafted SAML responses. Patches for those were shipped last December, but Arctic Wolf's advisory follows a growing wave of reports from administrators who believe attackers are exploiting a patch bypass for CVE-2025-59718 to compromise firewalls that were already thought to be fixed.
On [6]Reddit , affected admins say Fortinet has privately acknowledged that FortiOS 7.4.10 does not fully remediate the SSO authentication bypass, despite the issue being flagged as patched with the release of FortiOS 7.4.9 in early December. Several customers report seeing intrusions on fully updated systems.
[7]Palo Alto kit sees massive surge in malicious activity amid mystery traffic flood
[8]Firewalls and VPNs are so complex now, they can actually make you less secure
[9]Fortinet 'fesses up to second 0-day within a week
[10]Another bad week for SonicWall as SMA 1000 zero-day under active exploit
Fortinet is now said to be preparing additional releases – FortiOS 7.4.11, 7.6.6, and 8.0.0 – over the coming days to fully address CVE-2025-59718.
Logs shared by affected customers show attackers logging in via SSO from the address cloud-init@mail.io, originating from IP address 104.28.244.114, before creating new admin users. Those indicators match the same activity that Arctic Wolf observed while analyzing the current FortiGate attacks, as well as similar exploitation attempts back in December.
[11]
Arctic Wolf is urging organizations to audit FortiGate admin accounts, review recent configuration changes, rotate credentials, and keep a close eye on SSO activity until Fortinet's next round of fixes lands. ®
Get our [12]Tech Resources
[1] https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aXJXv9Vzn-LdNQvyUi_1BAAAAwc&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXJXv9Vzn-LdNQvyUi_1BAAAAwc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aXJXv9Vzn-LdNQvyUi_1BAAAAwc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[5] https://www.theregister.com/2025/12/09/december_2025_patch_tuesday/
[6] https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/
[7] https://www.theregister.com/2025/11/20/palo_alto_traffic_flood/
[8] https://www.theregister.com/2025/10/28/cisco_citrix_vpn_ransomware/
[9] https://www.theregister.com/2025/11/19/fortinet_confirms_second_fortiweb_0day/
[10] https://www.theregister.com/2025/12/18/sonicwall_sma_1000_0day/
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXJXv9Vzn-LdNQvyUi_1BAAAAwc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[12] https://whitepapers.theregister.com/
You'd think
These big firewall companies would be paying for decent pentests to test their own kick with words to the effect of "Fill your boots. Take one away and try whatever tools you have". Instead of the bullshit controlled ones as we had some years ago when the pentester said "I need an admin account". What? What's the point of that then if I'm just giving you admin, the point is to see if you can make yourself admin by finding the faults! (not the fault of the pentesters. The fault of the companies that restrict their tests).