Ethical Hacking News
Fortinet, Ivanti, and SAP have issued urgent patches to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution. These patches are essential for protecting systems from potential threats.
Fortinet, Ivanti, and SAP have issued urgent patches to address critical security flaws in their products. The Fortinet vulnerabilities affect multiple products, including FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager. Ivanti's Endpoint Manager has been affected by four security flaws, one of which is a critical-severity bug. SAP has addressed three critical-severity flaws across multiple products. Organizations are advised to disable FortiCloud login feature until it can be updated.
Fortinet, Ivanti, and SAP have issued urgent patches to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution. This is a stark reminder of the importance of keeping one's software up-to-date with the latest security patches.
The Fortinet vulnerabilities affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager and relate to a case of improper verification of a cryptographic signature. They are tracked as CVE-2025-59718 and CVE-2025-59719 (CVSS scores: 9.8). The company has noted that the FortiCloud SSO login feature is not enabled in the default factory settings, however, it can be easily disabled to protect against attacks exploiting these vulnerabilities.
To temporarily protect their systems against attacks exploiting these vulnerabilities, organizations are advised to disable the FortiCloud login feature (if enabled) until it can be updated. This can be done in two ways -
1. Go to System -> Settings and switch "Allow administrative login using FortiCloud SSO" to Off.
2. Run the below command in the CLI -
config system global
set admin-forticloud-sso-login disable
end
Ivanti has also shipped updates to address four security flaws in Endpoint Manager (EPM), one of which is a critical-severity bug in the EPM core and remote consoles. The vulnerability, assigned the CVE identifier CVE-2025-10573, carries a CVSS score of 9.6.
A security researcher at Rapid7 has discovered a flaw in Ivanti's Endpoint Manager that allows an attacker with unauthenticated access to execute arbitrary JavaScript in the context of an administrator session. This vulnerability is tracked as CVE-2025-13659 and is related to improper verification of cryptographic signatures.
On the other hand, SAP has addressed three critical-severity flaws across multiple products, including a code injection vulnerability in SAP Solution Manager (CVE-2025-42880), multiple vulnerabilities in Apache Tomcat within SAP Commerce Cloud (CVE-2025-55754), and a deserialization vulnerability in SAP jConnect SDK for Sybase Adaptive Server Enterprise (ASE) (CVE-2025-42928).
The patches have been made available to address these security flaws and prevent attacks exploiting them. It is essential that users move quickly to apply the fixes to ensure their systems are protected against these critical vulnerabilities.
The incident highlights the importance of keeping one's software up-to-date with the latest security patches. It also emphasizes the need for organizations to implement robust security measures to protect their systems from potential threats. By taking proactive steps, organizations can minimize the risk of successful attacks and ensure their systems remain secure.
In recent times, we have seen numerous high-profile incidents where attackers have exploited vulnerabilities in widely used software to gain unauthorized access to systems and steal sensitive data. These incidents serve as a stark reminder of the importance of prioritizing security when it comes to one's systems and data.
In this article, we will explore the details of the Fortinet, Ivanti, and SAP patches and provide guidance on how organizations can protect their systems against these critical vulnerabilities.
Related Information:
https://www.ethicalhackingnews.com/articles/Fortinet-Ivanti-and-SAP-Issue-Urgent-Patches-for-Authentication-and-Code-Execution-Flaws-ehn.shtml
https://thehackernews.com/2025/12/fortinet-ivanti-and-sap-issue-urgent.html
https://www.securityweek.com/ivanti-fortinet-patch-remote-code-execution-vulnerabilities/
Published: Tue Dec 9 22:59:12 2025 by llama3.2 3B Q4_K_M