HAPPY LIFE

Happy life section image

WHAT NEWS?

Fortinet Ivanti SAP security patches

Fortinet, Ivanti, and SAP Release Emergency Security Patches for Critical Vulnerabilities


Reddit logo Twitter logo Substack logo Medium logo
Feb
4
Os-Intel Logo

Trusted News - Expert Analysis - Global Coverage

| 4,250 Views | 7 Min | 56 Comments

Fortinet, Ivanti, and SAP Release Emergency Security Patches for Critical Vulnerabilities

DECEMBER 15, 2025 • CYBERSECURITY
Fortinet, Ivanti, and SAP Security Patches

Fortinet, Ivanti, and SAP have issued urgent patches for high-severity vulnerabilities that could enable authentication bypass or remote code execution. Cybersecurity teams are urged to update systems immediately.

G

lobal cybersecurity teams are racing to deploy newly released emergency patches from Fortinet, Ivanti, and SAP, after all three companies disclosed critical vulnerabilities that could allow attackers to bypass authentication mechanisms or execute arbitrary code on affected systems.

The coordinated patch releases from three major enterprise software vendors highlight the escalating threat landscape facing organizations worldwide. With vulnerabilities affecting everything from network security appliances to enterprise resource planning systems, security administrators face a challenging December patch cycle that demands immediate attention and rapid deployment.

Fortinet Warns of Authentication Bypass in FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager

Fortinet disclosed two critical vulnerabilities—CVE-2025-59718 and CVE-2025-59719 (CVSS 9.8)—stemming from improper cryptographic signature verification. The flaws affect multiple Fortinet products, including FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.

CVE-2025-59718

CVSS 9.8 - Improper cryptographic signature verification

CVE-2025-59719

CVSS 9.8 - SAML message handling vulnerability

Affected Products

FortiOS, FortiWeb, FortiProxy, FortiSwitchManager

Fortinet security vulnerabilities

According to Fortinet's advisory, a crafted SAML message could allow an unauthenticated attacker to bypass FortiCloud SSO login entirely. "This vulnerability may allow an attacker to bypass FortiCloud SSO authentication if the feature is enabled," the company stated. Fortinet clarified that FortiCloud SSO login is disabled by default, but administrators who registered devices with FortiCare may have enabled the feature unintentionally.

Temporary Mitigation

Organizations are urged to immediately disable FortiCloud SSO until patches are applied. This can be done via:

GUI: System → Settings → Disable "Allow administrative login using FortiCloud SSO"

CLI:
config system global
set admin-forticloud-sso-login disable
end

Ivanti Patches Critical EPM Vulnerability Enabling Admin Session Hijacking

Ivanti has issued a critical fix for CVE-2025-10573 (CVSS 9.6), affecting Ivanti Endpoint Manager (EPM). The vulnerability allows a remote unauthenticated attacker to execute malicious JavaScript via stored Cross-Site Scripting (XSS) in the EPM dashboard.

CVE-2025-10573

CVSS 9.6 - Stored XSS in EPM dashboard

Discovery

Ryan Emmons, Rapid7 researcher

Attack Impact

Admin session hijacking via malicious JavaScript

The flaw was discovered by Rapid7 researcher Ryan Emmons, who warned that attackers could join fake managed devices to the EPM server, poison administrator dashboards with malicious payloads, and hijack admin sessions with a single page view. "A passive admin interaction is enough to trigger client-side code execution," Emmons explained.

Ivanti EPM vulnerability

Ivanti emphasized that while user interaction is required, there is no evidence of active exploitation. Also patched in the same release (EPM 2024 SU4 SR1) were CVE-2025-13659 (high-severity RCE), CVE-2025-13661 (high-severity RCE), and CVE-2025-13662 (cryptographic signature verification flaw, enabling arbitrary code execution).

SAP Issues December Security Updates Addressing Three Critical Flaws

SAP released a bundle of security updates fixing 14 vulnerabilities, three of which are critical. The December patch bundle represents one of the most significant security releases from SAP in recent months, addressing vulnerabilities that could impact core business systems worldwide.

CVE-2025-42880

CVSS 9.9 - Code injection in SAP Solution Manager

CVE-2025-55754

CVSS 9.6 - Apache Tomcat flaws in SAP Commerce Cloud

CVE-2025-42928

CVSS 9.1 - Deserialization flaw in SAP jConnect SDK

"Solution Manager is a core component of SAP landscapes. We strongly recommend immediate remediation," said Thomas Fritsch, Onapsis Security Researcher. "These vulnerabilities could allow attackers to compromise entire SAP ecosystems if left unpatched, potentially leading to data breaches and operational disruption."

Security firm Onapsis reported two of the critical issues and urged organizations to prioritize patching, especially for SAP Solution Manager, which plays a central role in enterprise SAP environments. CVE-2025-42928 allows remote code execution, but exploitation requires elevated privileges, offering a limited—but real—attack path.

Immediate Patching Strongly Recommended

With threat actors increasingly targeting enterprise-grade platforms from Fortinet, Ivanti, and SAP, cybersecurity experts warn that delays in patch deployment could lead to network-wide compromise, authentication bypass, remote code execution (RCE), data breaches, and long-term footholds by state-linked actors or ransomware groups.

Fortinet Actions

Disable FortiCloud SSO, apply patches, monitor authentication logs

Ivanti Actions

Update to EPM 2024 SU4 SR1, audit admin sessions

SAP Actions

Apply December patches, prioritize Solution Manager

General Actions

Enforce privileged access security, monitor for anomalies

Risk Assessment

Audit systems for signs of exploitation, update asset inventory

Compliance

Document patch status for regulatory requirements

Security teams are urged to apply vendor patches immediately, disable vulnerable features (where applicable), enforce privileged access security, monitor authentication logs for anomalies, and audit systems for signs of exploitation. The simultaneous release of critical patches from multiple major vendors creates a particularly challenging environment for security teams already stretched thin during the holiday season.

"This December patch cycle is one of the most critical we've seen in years," warned cybersecurity analyst Maria Rodriguez. "Organizations running Fortinet, Ivanti, or SAP systems need to treat these patches as emergency updates. The vulnerabilities being addressed are exactly the types of flaws that ransomware groups and state-sponsored actors look for when targeting enterprise networks."

Vulnerability Summary Table

Vendor CVE CVSS Impact Affected Products
Fortinet CVE-2025-59718 9.8 Authentication Bypass FortiOS, FortiWeb, FortiProxy
Fortinet CVE-2025-59719 9.8 SAML Bypass FortiOS, FortiSwitchManager
Ivanti CVE-2025-10573 9.6 Stored XSS / Session Hijacking Endpoint Manager (EPM)
SAP CVE-2025-42880 9.9 Code Injection / RCE SAP Solution Manager
SAP CVE-2025-55754 9.6 Tomcat Vulnerabilities SAP Commerce Cloud
SAP CVE-2025-42928 9.1 Deserialization / RCE SAP jConnect SDK

Recommended Actions for Security Teams

Based on the severity and potential impact of these vulnerabilities, security teams should prioritize the following actions:

The simultaneous disclosure of critical vulnerabilities across multiple enterprise platforms underscores the importance of maintaining robust patch management processes and having dedicated resources for emergency security updates. Organizations that delay patching these vulnerabilities risk significant security incidents that could impact operations, data integrity, and regulatory compliance.

"In today's threat landscape, patch latency directly correlates with breach probability," concluded cybersecurity expert Dr. Alan Chen. "These vulnerabilities from Fortinet, Ivanti, and SAP represent low-hanging fruit for attackers. Organizations that patch quickly reduce their attack surface significantly. Those that delay become attractive targets for both opportunistic and targeted attacks."

Tags: Cybersecurity, Security Patches, Fortinet, Ivanti, SAP, Vulnerabilities, CVE, Authentication Bypass, Remote Code Execution, Enterprise Security, Patch Management, CVSS, Critical Vulnerabilities, Network Security

Cybersecurity Reporter Avatar
Cybersecurity Reporter - Published posts: 24
John Doe is a cybersecurity reporter specializing in software vulnerabilities, security patches, and enterprise security threats. With extensive experience covering CVE disclosures and patch cycles, John provides timely analysis of critical security updates and their impact on organizations worldwide.
Successfully subscribed to newsletter!