CVE-2025-59718
Published Dec 9, 2025
Last updated 4 months ago
AI description
CVE-2025-59718 is a vulnerability affecting Fortinet's FortiOS, FortiProxy, and FortiSwitchManager. It stems from an improper verification of cryptographic signatures, which could allow an unauthenticated attacker to bypass FortiCloud Single Sign-On (SSO) login authentication. This bypass is possible through a crafted Security Assertion Markup Language (SAML) message, but only if the FortiCloud SSO login feature is enabled on the device. The FortiCloud SSO login feature is not enabled by default in factory settings. However, it becomes enabled when an administrator registers the device with FortiCare via the GUI, unless the administrator specifically disables the "Allow administrative login using FortiCloud SSO" option during registration.
- Description
- A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
- Products
- fortiproxy, fortiswitchmanager, fortios
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability
- Exploit added on
- Dec 16, 2025
- Exploit action due
- Dec 23, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- psirt@fortinet.com
- CWE-347
- Hype score
- Not currently trending
🔒 #CyberSecurity CVE-2025-59718: FortiGate SSO Login Bypass — Detection and Containment Guide "Rapid7's recent Incident Response (IR) engagement confirms what security teams…" 🔗 https://t.co/7NA9AQ8b37 #CyberSecurity #ThreatIntel #managedsoc #mdr #securitymonitoring
@SecurityAr58409
17 Apr 2026
175 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔒 #CyberSecurity CVE-2025-59718: FortiGate SSO Login Bypass — Incident Response Findings and Det… "In December 2025, Fortinet disclosed CVE-2025-59718, a critical vulnerability affecting…" 🔗 https://t.co/oSLjFaWlii #CyberSecurity #ThreatIntel #soc #mdr #managedsoc
@SecurityAr58409
15 Apr 2026
77 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CYBERDUDEBIVASH SENTINEL APEX ALERT 🚨 Threat: FortiGate CVE-2025-59718 Exploitation: Incident Response Findings Intel Report: https://t.co/HiHKM1vuND
@cyberbivash
10 Apr 2026
135 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CYBERDUDEBIVASH SENTINEL APEX ALERT 🚨 Threat: FortiGate CVE-2025-59718 Exploitation: Incident Response Findings Intel Report: https://t.co/fZwUjqkT8T
@cyberbivash
10 Apr 2026
124 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiGate CVE-2025-59718 exploited to bypass SSO authentication, allowing attackers to create admin accounts, download configs, and maintain persistence. Lateral movement involved Mimikatz, RDP, and PsExec. #FortiGateFlaw #NetworkSecurity https://t.co/3NDZ8HQULd
@TweetThreatNews
9 Apr 2026
239 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CYBERDUDEBIVASH SENTINEL APEX ALERT 🚨 Threat: FortiGate CVE-2025-59718 Exploitation: Incident Response Findings Intel Report: https://t.co/Zd22iGouBm
@cyberbivash
9 Apr 2026
188 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiGate CVE-2025-59718 Exploited: Attackers Bypass SSO Login https://t.co/QYTCgWRnrz
@cybrsecpath
9 Apr 2026
151 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#threatreport #MediumCompleteness FortiGate CVE-2025-59718 Exploitation: Incident Response Findings | 08-04-2026 Source: https://t.co/8AfrkB9pZV Key details below ↓ 🧑💻Actors/Campaigns: Akira_ransomware 💀Threats: Mimikatz_tool, Credential_dumping_technique, https:/
@rst_cloud
8 Apr 2026
185 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Investigating FortiGate CVE-2025-59718 Exploitation: IR Tales from The Field - https://t.co/8Ss7CiCf5q
@moton
8 Apr 2026
199 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Rapid7 details real-world exploitation of FortiGate CVE-2025-59718, revealing how attackers used SSO bypass vulnerability to establish persistence and pivot into internal networks. Investigation showcases working backwards from internal compromise to edge device IAV. Key
@DFIR_Radar
8 Apr 2026
389 Impressions
0 Retweets
4 Likes
3 Bookmarks
1 Reply
0 Quotes
Rapid7 Cybersecurity Blog | FortiGate CVE-2025-59718 Exploitation: Incident Response Findings https://t.co/gcCOoGkKhE
@StopMalvertisin
8 Apr 2026
563 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Rapid7’s IR team was recently engaged around CVE-2025-59718 – a vuln that facilitates SSO login bypass in #Fortinet FortiGate appliances. In a new blog, dive into our investigative methodology, practical detection opportunities & more: https://t.co/JILOVYAu4h
@rapid7
8 Apr 2026
585 Impressions
2 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiGate のゼロデイ脆弱性 CVE-2026-24858 などを悪用:ネットワーク侵入と資格情報窃取を検出 https://t.co/IJuFDvl6Oz このインシデントが示すのは、複数の深刻な脆弱性が原因となり、被害が広がってしまう状況です
@iototsecnews
20 Mar 2026
131 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Hackers Exploit FortiGate Firewalls in Widespread Attacks to Steal Network Credentials Threat actors are primarily abusing several FortiGate vulnerabilities, including CVE-2025-59718, CVE-2025-59719, and the recently patched CVE-2026-24858. These flaws allow unauthorized users h
@johndjohnson
17 Mar 2026
861 Impressions
8 Retweets
11 Likes
5 Bookmarks
0 Replies
0 Quotes
Today's episode of Prime Cyber Insights focuses on significant shifts in the threat landscape, starting with an FBI warning about the AVrecon malware's massive router compromise. We detail the technical specifics of three critical Fortinet vulnerabilities—CVE-2025-59718, https:
@NeuralNewscast
17 Mar 2026
111 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 استغلال ثغرات في جدران حماية FortiGate لاختراق الشبكات وسرقة بيانات الاعتماد 🛡️ الفئة: هجوم سيبراني 📝 الملخص: رصدت عمليات اختراق متعددة استهدفت جدران
@GMashari
16 Mar 2026
173 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 استغلال ثغرات في جدران حماية FortiGate لاختراق الشبكات وسرقة بيانات الاعتماد رصدت عمليات اختراق متعددة استهدفت جدران الحماية FortiGate (NGFW) في أوائل عام 2026، حي
@MisbarSec
16 Mar 2026
159 Impressions
0 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiGate CVE-2025-59718 & -59719 (CVSS 9.8) being chained in the wild. Attack chain: unauth admin access → FortiOS cred harvest → RMM → AD dump. Some intrusions undetected 2 months. 6th Fortinet alert in our feed this week. https://t.co/NT4wNh8fbb
@CybrPulse
15 Mar 2026
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiGate CVE-2025-59718/-59719 attacks going deeper. SentinelOne case: 3 months undetected, rogue AD machines, full NTDS dump. 21 Fortinet articles in our feed this week. Edge device → full domain compromise is the standard playbook right now.
@CybrPulse
14 Mar 2026
145 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiGate NGFWs exploited since Nov 2025 via #CVE-2025-59718, CVE-2025-59719, CVE-2026-24858 to steal LDAP credentials & exfiltrate NTDS.dit. Patch immediately. #threatintel #mssp #cybersecurity #mssp
@bettermssp
11 Mar 2026
144 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiGate devices exploited via CVE-2025-59718/19 and CVE-2026-24858 to extract AD/LDAP credentials, enabling lateral movement, malware. Healthcare, government, and MSPs targeted, attackers creating admin accounts, exfiltrating NTDS.dit via AWS. https://t.co/eHC23nYfEP
@LLMTalksTech
11 Mar 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
TRC analysis shows attackers exploited FortiGate devices (CVE-2025-59718, CVE-2026-24858) to extract encrypted service account credentials from configuration files. After decrypting the credentials, they authenticated to Active Directory and enrolled rogue workstations for
@aviatrixtrc
10 Mar 2026
129 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiGate機器を入口としたネットワーク侵害について。SentinelOne社報告。CVE-2025-59718、CVE-2025-59719、CVE-2026-24858で例示される既知の脆弱性の悪用。 https://t.co/YDeBMmdsL4
@__kokumoto
10 Mar 2026
1282 Impressions
1 Retweet
5 Likes
1 Bookmark
0 Replies
0 Quotes
Fortinet SSO認証回避の脅威 FortiOS等でSSO認証を回避される深刻な脆弱性 (CVE-2025-59718等)の悪用が確認されています。 1.FortiCloud SSOログイン機能の利用有無を即時確認 2.修正済みVer(7.6.4 / 7.4.9等)へアップデー
@esunekk
5 Mar 2026
138 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
تحذير عاجل لأصحاب Fortinet! 🚨 Arctic Wolf تكشف عن هجمات آلية جديدة تستهدف FortiGate لتغيير إعدادات الجدار الناري واختراق SSO عبر CVE-2025-59718/59719. يتم إنشاء حسابات للتحكم. ال
@glitch4techs
31 Jan 2026
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Identity and Edge exploits defined December 2025, with CVE-2025-55182 leading the pack ahead of CVE-2015-4040 and CVE-2025-59718/19. Attackers are optimizing for repeatable access at scale, often recycling "old but everywhere" flaws because they remain consistently exposed.
@ReliaQuestTR
30 Jan 2026
96 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fortinet confirms Fortinet CVE-2025-59718 bypass still active on upgraded FortiOS via new SAML path. Attackers steal configs, create backdoors. Immediate fix: Disable FortiCloud SSO, restrict admin access. Check our blog: https://t.co/luL0PsirmE https://t.co/n0WEWcIVaw
@blackbeltsecure
30 Jan 2026
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 FortiOS [—] Jan 30, 2026 Comprehensive security advisory on recent, actively exploited authentication bypass vulnerabilities (CVE-2026-24858, CVE-2025-59718) endangering FortiOS and related products despite recent patches. Checkout our Threat Intelligence Platform:... http
@transilienceai
30 Jan 2026
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【独自】フォーティネットがFortiOS等多数の製品における重大(Critical)な認証回避のゼロデイ脆弱性CVE-2026-24858を修正。FortiCloud SSO経由での認証回避の脆弱性CVE-2025-59718へのパッチを当てても被害が続いていた関
@__kokumoto
27 Jan 2026
3463 Impressions
9 Retweets
14 Likes
11 Bookmarks
2 Replies
1 Quote
⚠️ Vulnerabilidades en productos Fortinet ❗ CVE-2025-59719 ❗ CVE-2025-59718 ➡️ Más info: https://t.co/ZIVEEsEM7e https://t.co/zK6Nwjxc0y
@CERTpy
27 Jan 2026
152 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fortinet、パッチ済みデバイスに対するFortiCloud SSO悪用攻撃について認める:CVE-2025-59718 | Codebook|Security News https://t.co/XDMeHOhbPY
@ohhara_shiojiri
27 Jan 2026
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
According to Arctic Wolf, unauthorized FortiCloud SSO logins resembling the FortiCloud SSO auth bypasses disclosed and patched in Dec 2025 (CVE-2025-59718/59719) are being observed again in Jan 2026 as an automated campaign. Post-compromise activity includes adding local admin ht
@nekono_naha
27 Jan 2026
1832 Impressions
4 Retweets
12 Likes
3 Bookmarks
0 Replies
0 Quotes
🚨 We are observing active exploitation of CVE-2025-59718 and CVE-2025-59719, targeting FortiCloud SSO to bypass authentication. Attackers are using these flaws to maintain valid sessions and persistence even after the underlying devices are fully patched. Patching closes the
@ReliaQuestTR
26 Jan 2026
121 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fortinet FortiGate firewalls are under active attack via a FortiCloud SSO auth-bypass (CVE-2025-59718) — attackers are creating rogue admin accounts and exfiltrating firewall configs. 10,000+ devices remain exposed. Disable FortiCloud SSO, restrict admin access, and hunt for ne
@Anavem_
26 Jan 2026
121 Impressions
1 Retweet
4 Likes
0 Bookmarks
0 Replies
0 Quotes
Geopolitical tensions and cyber operations remain tightly intertwined as state-sponsored actors and criminal groups exploit vulnerabilities to advance strategic objectives. Recent exploits of Fortinet firewall flaws, including incomplete patches for CVE-2025-59718 and
@ox0ffff
26 Jan 2026
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Weekly Recap: Fortinet Firewall Patch Gaps, AI-Built VoidLink, CrashFix-to-ModeloRAT, and Critical CVEs This week’s recap highlights how “patched” doesn’t always mean safe—Fortinet firewalls saw fresh exploitation via incomplete fixes for CVE-2025-59718/59719, whi
@ThreatSynop
26 Jan 2026
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Fortinet、パッチ済みデバイスに対するFortiCloud SSO悪用攻撃について認める:CVE-2025-59718 ⚠️VMware vCenterの脆弱性が悪用される、CISAがKEVカタログに追加:CVE-2024-37079 〜サイバーセキュリティ週末の話題〜 https
@MachinaRecord
26 Jan 2026
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
How to Secure Your FortiGate Firewall Against CVE-2025-59718 Exploits Read more: https://t.co/Bri0irwdII #FortiGate #CVE-2025-59718 #FirewallSecurity #ExploitProtection #How-To
@beast_xtra
25 Jan 2026
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Week in Review: Patched FortiGate Firewalls Still Compromised, Cisco UC RCE Probed in the Wild Last week highlighted active exploitation pressure on perimeter systems, including reports that “fully patched” FortiGate devices may still be getting compromised (CVE-2025-597
@ThreatSynop
25 Jan 2026
34 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Patching isn't enough. Check for the "Helpdesk" backdoor. If you run Fortinet, the CVE-2025-59718 exploit isn't just a vulnerability, it’s an active invasion sales@accessystem.com #CyberSecurity #Fortinet #CISO #ThreatIntel #NetworkSecurity #BlueTeam #ACCESSYSTEM #OORONE https
@ACCESSYSTEM_IT
25 Jan 2026
63 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fortinet confirms active FortiCloud SSO bypass affecting fully patched FortiGate firewalls, exploiting CVE-2025-59718 and CVE-2025-59719. Vulnerability allows persistent accounts, VPN access, and config theft. #FortinetRisk #SSOVulnerability #USA https://t.co/tYboJhOZlB
@TweetThreatNews
25 Jan 2026
137 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
🚨 ALERTA FORTINET Firewalls FortiGate PARCHEADOS estan siendo hackeados - Parche de diciembre NO funciona - Atacantes crean backdoors en SEGUNDOS - Roban configs completas Solucion temporal: Desactivar FortiCloud SSO CVE-2025-59718 / CVE-2025-59719 #fortinet #cibersegurid
@secnetnew
24 Jan 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiOS 7.4.9 faces active CVE-2025-59718 exploits via forged FortiCloud SSO. Ingram Micro ransomware exposed 42,521 records. EU moves to ban high-risk non-EU telecom gear amid rising hacktivist attacks. #Fortinet #RansomwareAttack #Europe https://t.co/7xpkQxpcxx
@TweetThreatNews
24 Jan 2026
217 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
Fortinet confirms FortiCloud SSO exploitation bypassing patches for CVE-2025-59718 and CVE-2025-59719. Attackers automate account creation, enable VPNs, and extract configs from FortiGate devices. #FortiCloudBreach #NetworkSecurity #USA https://t.co/XSELNE3X3q
@TweetThreatNews
24 Jan 2026
160 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Fortinet confirms critical FortiCloud SSO bypass (CVE-2025-59718) remains unpatched. Automated attacks create VPN admin accounts and steal configs within seconds. Admin access restriction advised. #Fortinet #AuthBypass #InfoSec https://t.co/eJsyK3qlzs
@TweetThreatNews
24 Jan 2026
126 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
FortiGateのSSO認証バイパス脆弱性(CVE-2025-59718/59719)、パッチ適用済み環境でも新たな攻撃経路で悪用が確認されたとのこと。FortiCloud SSO利用中の場合は一時無効化が推奨されています。 https://t.co/JhRzmod5iv #サイ
@dejital_secure
24 Jan 2026
62 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
FortiGate firewalls patched with 7.4.10 are still vulnerable to CVE-2025-59718 auth bypass, allowing attackers to create admin accounts. Fortinet to release new fixes; FortiCloud SSO also affected. #Fortinet #AuthenticationFlaw #USA https://t.co/ya2506vnK2
@TweetThreatNews
24 Jan 2026
137 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Fortinet confirms active exploitation of CVE-2025-59718 / 59719, allowing FortiGate FortiCloud SSO bypass — even on fully patched devices.
@KPGlobalCharts
23 Jan 2026
77 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Active exploits reported on FortiOS 7.4.9 targeting CVE-2025-59718, a Fortinet SSO bypass vulnerability. Attackers use FortiCloud SSO to create unauthorized admin accounts and export configs. #Fortinet #SSOVulnerability #USA https://t.co/3Q0O8RSGOl
@TweetThreatNews
23 Jan 2026
106 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Fortinet Confirms Active Exploitation of Critical FortiCloud SSO Auth Bypass Flaws (CVE-2025-59718/59719) Fortinet says attackers are actively exploiting critical FortiCloud SSO bypass bugs via crafted SAML requests on FortiOS/FortiWeb/FortiProxy/FortiSwitch Manager, creatin
@ThreatSynop
23 Jan 2026
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD1BE28E-8FDA-4DA9-9DA8-EF5266CD3C54",
"versionEndExcluding": "7.0.22",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B2E82CF-00E9-4D67-B472-E54A325F87FC",
"versionEndExcluding": "7.2.15",
"versionStartIncluding": "7.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F989EFB6-A5C9-414B-A85B-786D309B41AF",
"versionEndExcluding": "7.4.11",
"versionStartIncluding": "7.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11CA0204-FD63-4614-821E-E2C4E34F7979",
"versionEndExcluding": "7.6.4",
"versionStartIncluding": "7.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B9AA70-BB46-403B-94C1-D94C64E22334",
"versionEndExcluding": "7.0.6",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE22A407-02CB-4979-A38D-9EBAFEB350F6",
"versionEndExcluding": "7.2.7",
"versionStartIncluding": "7.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCEB8B8A-797C-4E5E-BCDB-A54EB83AD8A2",
"versionEndExcluding": "7.0.18",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FAAA2E-7A53-4F6B-A9C7-1E2B4CB5F7EB",
"versionEndExcluding": "7.2.12",
"versionStartIncluding": "7.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2093EFE3-4B7F-4806-9850-C42B26BC64AC",
"versionEndExcluding": "7.4.9",
"versionStartIncluding": "7.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C30E0D-7F09-42D2-9EB1-E2196BD50D75",
"versionEndExcluding": "7.6.4",
"versionStartIncluding": "7.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]