FortiGate Firewalls Targeted in Automated Attacks to Harvest Configuration Data

FortiGate Firewalls Targeted in Automated Attacks to Harvest Configuration Data
FortiGate Firewalls Targeted in Automated Attacks to Harvest Configuration Data
Arctic Wolf has tracked automated malicious activity targeting FortiGate firewalls globally.

Threat actors are exploiting previously disclosed SSO vulnerabilities to gain unauthorized access, create persistent backdoor accounts, and exfiltrate sensitive firewall configurations containing credentials and network topology details.

Attack Overview

The campaign involves attackers establishing unauthorized administrative accounts through FortiCloud SSO bypass, then automatically extracting firewall configurations to external servers.

Malicious logins target generic service accounts like cloud-init@mail.io, followed by rapid configuration downloads and persistence account creation, all occurring within seconds, indicating a fully automated exploitation infrastructure.

This activity mirrors a December 2025 campaign documented by Arctic Wolf, suggesting threat actors continue leveraging the same CVE vulnerabilities against unpatched or improperly defended deployments.

Vulnerabilities Under Exploitation

Fortinet released advisories in early December for two critical authentication bypass flaws:

  • CVE-2025-59718: SAML authentication bypass allowing unauthenticated SSO login
  • CVE-2025-59719: Related authentication bypass vulnerability

Both vulnerabilities affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager when FortiCloud SSO is enabled.

Arctic Wolf confirmed that patches issued for these CVEs may not fully address the current threat activity, suggesting attackers have adapted their techniques or discovered additional access vectors.

Attackers authenticate via malicious SSO logins originating from specific hosting providers, then execute automated commands to download entire firewall configurations through the GUI interface.

Secondary persistence accounts (secadmin, itadmin, support, backup, remoteadmin, audit) are created immediately after initial compromise for long-term access.

Log analysis reveals configuration exfiltration occurs to the same source IP addresses used for authentication, with all activities executing within seconds, demonstrating sophisticated automation and reconnaissance capabilities.

Organizations managing FortiGate deployments should:

  1. Patch immediately – Apply all available Fortinet security updates, particularly addressing CVE-2025-59718 and CVE-2025-59719
  2. Reset credentials – Change all firewall administrative passwords and review audit logs for unauthorized account creation
  3. Restrict management access – Limit firewall GUI and SSH access to trusted internal networks only; disable public internet exposure
  4. Disable SSO temporarily – Turn off FortiCloud SSO via System → Settings or CLI command set admin-forticloud-sso-login disable until full remediation is confirmed
  5. Monitor for IOCs – Search logs for malicious accounts and source IPs listed below; investigate any configuration downloads to external addresses
IOC Type Description
cloud-init@mail.io Account Malicious account exfiltrating configs
cloud-noc@mail.io Account Malicious account exfiltrating configs
104.28.244[.]115 IP Address Source of intrusions
104.28.212[.]114 IP Address Source of intrusions
217.119.139[.]50 IP Address Source of intrusions
37.1.209[.]19 IP Address Source of intrusions
secadmin, itadmin, support, backup, remoteadmin, audit Accounts Persistence accounts created post-compromise

Arctic Wolf continues monitoring this activity and will provide updates as additional technical details emerge.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post FortiGate Firewalls Targeted in Automated Attacks to Harvest Configuration Data appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading