CrowdSec
2/10CrowdSec Score

FortiSwitchManager - Privilege Escalation (CVE-2025-59718)

Published on09-12-2025
First seen on18-12-2025

7Exploiting IPs reported

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

CrowdSec analysis

CVE-2025-59718 is a critical vulnerability in multiple Fortinet products, including FortiOS, FortiProxy, and FortiSwitchManager, that stems from improper verification of cryptographic signatures. This flaw allows unauthenticated attackers to bypass FortiCloud SSO login authentication by submitting a crafted SAML response, potentially granting unauthorized access to sensitive systems and data. Attackers exploiting this vulnerability could compromise network security, escalate privileges, and perform further malicious actions within affected environments.

CrowdSec has been tracking this vulnerability and its exploits since 17th of December 2025.

Based on data from the CrowdSec network, nearly all observed exploitation of CVE-2025-59718 is fully opportunistic, with attackers indiscriminately scanning the entire internet. These attacks are automated and lack any form of target selection or reconnaissance. CrowdSec network telemetry also shows that exploitation of CVE-2025-59718 has significantly declined over the past week. Attack volumes are well below the long-term average, suggesting attackers are rapidly losing interest. The vulnerability appears to be falling out of active use across most threat landscapes.

Attackers exploit this vulnerability by sending crafted SAMLResponse values via POST requests to the /remote/saml/login endpoint, attempting to bypass FortiCloud SSO authentication and gain administrative access.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.