Critical vulnerabilities in Fortinet CVE-2025-59718, CVE-2025-59719 exploited in the wild


A recently disclosed pair of vulnerabilities affecting Fortinet devices—CVE-2025-59718 and CVE-2025-59719—are drawing urgent attention after confirmation of their active exploitation in the wild. The vulnerabilities carry a critical CVSSv3 score and allow an unauthenticated remote attacker to bypass authentication using a crafted SAML message, ultimately gaining administrative access to the device.

Current information indicates that the two CVEs have the same root cause and are differentiated by the products affected: CVE-2025-59719 specifically affects FortiWeb, while CVE-2025-59718 affects FortiOS, FortiProxy, and FortiSwitchManager. While the vulnerable FortiCloud SSO feature is disabled by default in factory settings, it is automatically enabled when a device is registered to FortiCare via the GUI, unless an administrator explicitly opts out.

Read more…
Source: Rapid7


Sign up for the Cyber Security Review Newsletter
The latest cyber security news and insights delivered right to your inbox


Related:

  • Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets

    March 20, 2026

    The Federal Bureau of Investigation (FBI) is releasing this FLASH to disseminate information on malicious cyber activity conducted by actors on behalf of the Government of Iran Ministry of Intelligence and Security (MOIS). Specifically, MOIS cyber actors are responsible for using Telegram as a command-and-control (C2) infrastructure to push malware targeting Iranian dissidents, journalists opposed to ...

  • French naval officer’s jogging app logs Inadvertently expose France’s aircraft carrier location

    March 20, 2026

    The relentless pursuit of a personal best is a common motivator for athletes, but for one French naval officer, a routine morning run has now been linked to a national security scare. While the French military typically prides itself on stealth and strategic positioning, the precise coordinates of its flagship were recently broadcast worldwide via a ...

  • Cambodia: 9 foreigners nabbed in Phnom Penh cyber-scam raid

    March 20, 2026

    Eight Chinese nationals and one Malaysian were detained during a raid on a gated community in the capital on Wednesday. A joint force from the Phnom Penh Administrative Unified Command raided a property in the Borey Peng Huot development, located in the Niroth area of Chbar Ampov district. During the operation, officers seized 247 mobile phones ...

  • Hasta la vista, Hastalamuerte: An Overview of The Gentlemen’s TTPs

    March 19, 2026

    In face of so many new ransomware brands, and still remaining RaaS operations such as Medusa, Qilin, and DragonForce, prioritizing is not an easy task to accomplish. However, despite the amount of groups conducting attacks for extortion, the TTPs do not change that much; unless we are talking about Cl0p, Akira and other groups that ...

  • CISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devices

    March 19, 2026

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned companies to secure systems for managing their fleets of employee devices after pro-Iran hackers broke into medical tech giant Stryker and mass-wiped thousands of its phones, tablets, and computers. The agency said on Thursday that it was urging companies to take action and confirmed it was ...

  • DarkSword: Second iOS exploit chain in a month targeting iPhone users

    March 18, 2026

    A new exploit kit targeting iPhone users and stealing their sensitive data is being abused by “multiple” spyware vendors and suspected nation-state goons, security researchers said on Wednesday. The exploit kit, called DarkSword, has been in use since at least November 2025. It supports iOS versions 18.4 through 18.7, and exploits six different vulnerabilities to deploy ...