FortiGate Security Alert: Automated Attacks Exploit FortiCloud SSO Flaws (2026)

In a troubling development for network security, Arctic Wolf, a prominent cybersecurity firm, has alerted the public about a "new wave of automated malicious activities" that is exploiting vulnerabilities in Fortinet FortiGate devices. This alarming trend involves unauthorized alterations to firewall configurations, raising significant concerns for organizations relying on these systems.

The unsettling activity began on January 15, 2026, and bears a striking resemblance to a previous campaign from December 2025, where malicious single sign-on (SSO) logins were detected targeting the admin accounts of FortiGate appliances. This exploitation takes advantage of specific vulnerabilities identified as CVE-2025-59718 and CVE-2025-59719, which permit unauthorized users to bypass SSO login authentication using specially crafted SAML messages when the FortiCloud SSO feature is activated on impacted devices. These weaknesses affect a range of Fortinet products, including FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.

Arctic Wolf elaborated on this emerging threat cluster, stating, "This activity involved creating generic accounts aimed at maintaining persistent access, implementing configuration changes that allow VPN access to these accounts, and exfiltrating firewall configurations." In simpler terms, cybercriminals are establishing accounts that enable them to control the system and make changes that can compromise security.

More specifically, the attackers conducted malicious SSO logins using an account labeled "cloud-init@mail.io" from four distinct IP addresses. Following these unauthorized logins, they proceeded to export firewall configuration files to the same IP addresses via the graphical user interface (GUI). Here are the suspicious IP addresses associated with this activity:

  • 104.28.244[.]115
  • 104.28.212[.]114
  • 217.119.139[.]50
  • 37.1.209[.]19

Furthermore, the threat actors have been noted to create additional secondary accounts with names such as "secadmin," "itadmin," "support," "backup," "remoteadmin," and "audit"—these are likely intended to ensure continued access to the systems even if one entry point is compromised.

Arctic Wolf highlighted that all these events happened in rapid succession, supporting the idea that this is an automated process rather than manual intervention.

Interestingly, this disclosure aligns with discussions on Reddit, where several users have reported encountering malicious SSO logins on their fully-patched FortiOS devices. One user even mentioned that the "Fortinet developer team has confirmed the vulnerability still exists or remains unaddressed in version 7.4.10."

The Hacker News has reached out to Fortinet for further insights on this issue and will provide updates as information becomes available. In the meantime, experts recommend disabling the "admin-forticloud-sso-login" setting to mitigate any potential risks.

What do you think about these recent findings? Are you concerned about the effectiveness of security measures being implemented by companies like Fortinet? Share your thoughts in the comments below!

FortiGate Security Alert: Automated Attacks Exploit FortiCloud SSO Flaws (2026)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Terence Hammes MD

Last Updated:

Views: 6547

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Terence Hammes MD

Birthday: 1992-04-11

Address: Suite 408 9446 Mercy Mews, West Roxie, CT 04904

Phone: +50312511349175

Job: Product Consulting Liaison

Hobby: Jogging, Motor sports, Nordic skating, Jigsaw puzzles, Bird watching, Nordic skating, Sculpting

Introduction: My name is Terence Hammes MD, I am a inexpensive, energetic, jolly, faithful, cheerful, proud, rich person who loves writing and wants to share my knowledge and understanding with you.