Critical Fortinet Vulnerability: FortiCloud SSO Authentication Bypass

Fortinet has disclosed a critical vulnerability (CWE‑347: Improper Verification of Cryptographic Signature) affecting FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.

What’s the Issue

  • Root cause: Devices fail to properly verify signatures in SAML messages.
  • Impact: An unauthenticated attacker can craft malicious SAML messages to bypass FortiCloud SSO login and gain administrative access.
  • Discovery: Found internally by Fortinet’s Product Security team (Yonghui Han and Theo Leleu).
  • Risk profile:
    • FortiCloud SSO login is not enabled by default.
    • However, when registering a device to FortiCare via GUI, the “Allow administrative login using FortiCloud SSO” toggle is enabled by default unless manually disabled.

Mitigation & Workarounds

  • Immediate action:
    • Upgrade to patched versions listed below.
    • If patching is not possible, disable FortiCloud SSO login:
      • GUI: System → Settings → toggle off “Allow administrative login using FortiCloud SSO”.
      • CLI:Codeconfig system global set admin-forticloud-sso-login disable end

Affected Versions & Fixes

ProductVulnerable VersionsFixed Version
FortiOS 7.67.6.0 – 7.6.37.6.4+
FortiOS 7.47.4.0 – 7.4.87.4.9+
FortiOS 7.27.2.0 – 7.2.117.2.12+
FortiOS 7.07.0.0 – 7.0.177.0.18+
FortiOS 6.4Not affected
FortiProxy 7.67.6.0 – 7.6.37.6.4+
FortiProxy 7.47.4.0 – 7.4.107.4.11+
FortiProxy 7.27.2.0 – 7.2.147.2.15+
FortiProxy 7.07.0.0 – 7.0.217.0.22+
FortiSwitchMgr 7.27.2.0 – 7.2.67.2.7+
FortiSwitchMgr 7.07.0.0 – 7.0.57.0.6+
FortiWeb 8.08.0.08.0.1+
FortiWeb 7.67.6.0 – 7.6.47.6.5+
FortiWeb 7.47.4.0 – 7.4.97.4.10+

Why It Matters

  • Fortinet appliances are widely deployed in enterprise and government networks.
  • Authentication bypass flaws in SSO systems can lead to full administrative compromise.
  • Attackers could leverage this to disable defenses, pivot into internal networks, or deploy ransomware.

Recommended Next Steps

  1. Patch immediately to the fixed versions.
  2. Disable FortiCloud SSO login if patching is delayed.
  3. Audit logs for suspicious SAML messages or unauthorized admin logins.
  4. Restrict admin access and enforce MFA wherever possible.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.