Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsFortinet Admins Report Patched FortiGate Firewalls Getting Hacked
Fortinet Admins Report Patched FortiGate Firewalls Getting Hacked
Cybersecurity

Fortinet Admins Report Patched FortiGate Firewalls Getting Hacked

•January 21, 2026
0
BleepingComputer
BleepingComputer•Jan 21, 2026

Companies Mentioned

Fortinet

Fortinet

FTNT

Arctic Wolf

Arctic Wolf

CISA

CISA

Why It Matters

The ongoing exploit erodes confidence in Fortinet’s patch cycle and exposes enterprises to credential‑theft risks, while regulators pressure rapid remediation across critical infrastructure.

Key Takeaways

  • •FortiOS 7.4.9/7.4.10 still vulnerable to auth bypass
  • •Attackers use crafted SAML messages to create admin accounts
  • •Over 11,000 devices remain internet‑exposed with FortiCloud SSO enabled
  • •Fortinet plans emergency patches 7.4.11, 7.6.6, 8.0.0
  • •Disable FortiCloud SSO until full fix released

Pulse Analysis

The CVE‑2025‑59718 flaw illustrates how a seemingly resolved vulnerability can re‑emerge when patch verification is incomplete. FortiGate firewalls rely on FortiOS to enforce authentication, yet the recent SAML‑based bypass demonstrates that attackers can still forge single sign‑on tokens, granting them admin privileges without user interaction. This vector is especially potent because FortiCloud SSO, though optional, is often left enabled for convenience, creating a wide attack surface that spans legacy and newly deployed appliances.

Enterprise security teams are now scrambling to assess exposure. Shadowserver’s scan revealed more than 25,000 FortiGate units with FortiCloud SSO active in December, a figure that has only modestly declined to roughly 11,000 still reachable online. The persistence of these devices, combined with CISA’s directive to patch within a week, underscores the regulatory urgency surrounding critical infrastructure protection. Immediate mitigations—disabling the FortiCloud SSO login and tightening SAML validation—provide a stop‑gap, but they also highlight the operational friction when vendors issue incomplete fixes.

Looking ahead, the incident may reshape how vendors approach vulnerability disclosure and patch roll‑outs. Fortinet’s rapid announcement of 7.4.11, 7.6.6, and 8.0.0 suggests a shift toward emergency releases, yet customers will demand more transparent testing and validation to avoid repeat scenarios. Organizations should adopt layered defenses, such as network segmentation and continuous monitoring of SSO logs, to reduce reliance on single‑point authentication mechanisms. In the long term, the episode reinforces the need for robust supply‑chain security practices and proactive threat‑intelligence sharing across the cybersecurity ecosystem.

Fortinet admins report patched FortiGate firewalls getting hacked

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...