Fortinet FortiCloud SSO Login Authentication Bypass: What You Need to Know

Fortinet has issued a critical advisory on December 9, 2025 concerning two severe authentication‑bypass vulnerabilities that affect a broad spectrum of Fortinet devices, from FortiOS and FortiProxy to FortiWeb and FortiSwitchManager. The flaws-CVE‑2025‑59718 and CVE‑2025‑59719-enable attackers to sidestep FortiCloud Single‑Sign‑On (SSO) authentication by submitting a malicious SAML message that exploits a weakness in cryptographic signature verification. Below is a concise breakdown of the threat, its impact, and the steps you can take to protect your environment. 1. What the Vulnerabilities Are Fortinet's FortiCloud SSO feature, when enabled, relies on SAML tokens to authenticate administrators. The vulnerabilities arise because the devices improperly verify the signature of those tokens. If an attacker can craft a forged SAML assertion that the device accepts as valid, they can gain administrative access without knowing any legitimate credentials. CVE‑2025‑59718 affects FortiOS, FortiProxy, and FortiSwitchManager. CVE‑2025‑59719 targets FortiWeb's SSO implementation. Both issues can be exploited only when the FortiCloud…

0 Comments

Critical Vulnerability in React Server Components: What Organizations Need to Know

On December 3, 2025, the React team publicly disclosed a critical security vulnerability affecting React Server Components. The flaw has been assigned the identifier CVE-2025-55182 and carries a maximum severity rating. This issue enables unauthenticated remote code execution under certain conditions, making it one of the most serious web-framework vulnerabilities disclosed in recent years. The timing and severity of this disclosure matter. React, along with frameworks like Next.js, powers a significant percentage of modern web applications, including enterprise portals, SaaS platforms, e-commerce systems, and internal business applications. The presence of a remotely exploitable vulnerability in a default configuration elevates the risk far beyond niche developer scenarios. What Caused the Vulnerability The vulnerability originates within the implementation of the React Server Components protocol, often referred to as the Flight protocol. Specifically, the server logic responsible for interpreting RSC payloads fails to adequately validate and constrain the data received from remote clients.…

0 Comments

CISA and NSA Release New Security Blueprint for Microsoft Exchange — What It Means for Your Organization

On October 31, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and several international partners released a new security blueprint for hardening Microsoft Exchange servers. This release isn't just another best-practice document-it's a wake-up call for organizations still hosting or maintaining on-prem Exchange environments. For those relying on hybrid email infrastructures, this guidance may be the difference between staying secure and becoming a headline. At Critical Path Security, we've spent years helping organizations navigate complex Exchange, Microsoft 365, and hybrid configurations through our Secure Cloud Business Applications (SCuBA) assessments. This blueprint validates what we've been preaching: legacy Exchange environments are one of the most consistent entry points for attackers targeting both IT and OT environments. Why This Blueprint Matters Exchange has long been a favourite target of cyber threat actors. When compromised, it becomes a stepping stone-offering direct access to internal systems, cloud connectors, and even…

0 Comments

SCuBA Scans Now Included in Every Managed SOC Subscription

At Critical Path Security, we've always believed that compliance shouldn't be a guessing game-and security shouldn't rely on a checklist. Starting this month, every Managed SOC subscription now includes monthly SCuBA (Secure Cloud Business Applications) scans as part of our standard service. No upsells. No hidden fees. Just better visibility. The SCuBA framework, developed by CISA, is designed to assess Microsoft 365, Google Workspace, and related cloud environments against rigorous, government-grade baselines. By integrating it into our Managed SOC platform, we're bringing the same federal-level scrutiny directly to your organization-automatically, every month. What this means for you: Continuous validation of your cloud security posture Evidence-based alignment with NIST and CMMC controls Immediate remediation guidance for misconfigurations and risky settings Monthly executive summaries delivered alongside your SOC reporting Our analysts already monitor your endpoints, logs, and networks for threats in real time. Now, we're adding a new layer-continuous cloud configuration assurance-so…

0 Comments