11:00am, 18 December 2025
TLP Rating:
Active exploitation of vulnerabilities in multiple Fortinet products
Two critical vulnerabilities affecting multiple Fortinet products are reported to be under active exploitation.
CVE-2025-59718 and CVE-2025-59719 involve improper verification of cryptographic signatures which an unauthenticated attacker could use to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
The NCSC encourages organisations in New Zealand that use the affected products to review the advisory and apply the remediation as soon as possible. We also urge affected organisations to investigate unauthorised access or compromise of the affected products.
What's happening
Systems affected
The following Fortinet products are affected:
- FortiOS
- 7.0.0 through 7.0.17
- 7.2.0 through 7.2.11
- 7.4.0 through 7.4.8
- 7.6.0 through 7.6.3
- FortiProxy
- 7.0.0 through 7.0.21
- 7.2.0 through 7.2.14
- 7.4.0 through 7.4.10
- 7.6.0 through 7.6.3
- FortiSwitchManager
- 7.0.0 through 7.0.5
- 7.2.0 through 7.2.6
- FortiWeb
- 7.4.0 through 7.4.9
- 7.6.0 through 7.6.4
- 8.0.0
What to look for
How to tell if you're at risk
If you are running a Fortinet product within the version range listed above.
What to do
Prevention
To prevent exploitation, the affected Fortinet products need to be upgraded to the latest versions per the vendor advisory.
More information
Read more about this alert on the vendor website:
https://fortiguard.fortinet.com/psirt/FG-IR-25-647 External Link
Read more about the two critical vulnerabilities:
CVE-2025-59718 External Link
CVE-2025-59719 External Link
If you require more information or further support, submit a report on our website:
Report an incident
If you need assistance using the tool, call us on 0800 114 115. Calling us is free within New Zealand. We’re open 7am to 7pm, Monday to Friday, and we’re closed on public holidays.
How helpful was this page?
This site is protected by reCAPTCHA and the Google Privacy Policy External Link and Terms of Service External Link apply.