Fortinet, Ivanti, and SAP Release Urgent Fixes for Authentication and Code Execution Vulnerabilities

Security teams across multiple industries are racing to deploy urgent updates after Fortinet, Ivanti, and SAP released patches for high risk vulnerabilities that could allow attackers to bypass authentication controls or execute malicious code.

The newly disclosed flaws are considered especially dangerous because of their potential to provide remote, unauthenticated access to critical systems at scale.

Fortinet Addresses Severe Signature Verification Weakness

Fortinet confirmed that two critical vulnerabilities, identified as CVE-2025-59718 and CVE-2025-59719 with CVSS scores of 9.8, affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager. Both issues stem from improper cryptographic signature verification.

According to Fortinet, attackers could exploit the weakness by sending a crafted SAML message to bypass FortiCloud SSO authentication. This only applies if administrators have manually enabled FortiCloud SSO login, since it is disabled by default.

Organizations that cannot patch immediately are advised to temporarily disable FortiCloud SSO login through the dashboard or the following CLI commands:

config system global  
set admin-forticloud-sso-login disable  
end

Ivanti Patches Critical XSS Vulnerability in Endpoint Manager

Ivanti has rolled out fixes for four flaws in its Endpoint Manager (EPM). The most severe, CVE-2025-10573 with a CVSS score of 9.6, is a stored cross site scripting issue that allows a remote attacker to execute malicious JavaScript within an administrator session.

Researchers from Rapid7, who discovered the flaw, noted that an attacker can send a fake device report to the EPM server. Once the administrator views the modified dashboard, the attacker gains control of their session.

Ivanti also addressed three high severity vulnerabilities, CVE-2025-13659, CVE-2025-13661, and CVE-2025-13662. One of them, CVE-2025-13662, also involves improper cryptographic signature validation.

The company confirmed that there is no evidence of active exploitation so far, but emphasized the need for urgent patching.

SAP Fixes Multiple Critical Security Issues

SAP released its December security updates which include fixes for 14 vulnerabilities. Three of them are classified as critical:

CVE-2025-42880, CVSS 9.9, code injection in SAP Solution Manager
CVE-2025-55754, CVSS 9.6, multiple Apache Tomcat issues in SAP Commerce Cloud
CVE-2025-42928, CVSS 9.1, deserialization flaw in SAP jConnect SDK for Sybase ASE

Security firm Onapsis reported two of these vulnerabilities and warned that SAP Solution Manager plays a central administrative role, which elevates the impact of potential exploitation.

Since cybercriminals frequently target enterprise software from Fortinet, Ivanti, and SAP, experts recommend applying the latest patches without delay to prevent authentication bypass, remote code execution, and potential breaches.

Found this article interesting? Follow us on  Twitter , Facebook, Blue sky and LinkedIn to read more exclusive content we post.