FortiGate Firewalls Targeted in High-Severity Exploit Wave
Basically, hackers are breaking into FortiGate firewalls to steal sensitive information.
FortiGate firewalls are under attack as hackers exploit critical vulnerabilities. Organizations using these firewalls are at risk of credential theft and network breaches. Immediate patching and credential rotation are essential to mitigate these threats.
The Flaw
In early 2026, a series of intrusions targeted FortiGate? Next-Generation Firewalls (NGFW), exploiting vulnerabilities that allow unauthorized access. The attackers leveraged three critical flaws, particularly CVE-2025-59718 and CVE-2025-59719, both rated at 9.8 on the CVSS scale. These vulnerabilities stem from improper verification of cryptographic signatures, enabling attackers to send crafted SAML? tokens and gain administrative access without valid credentials.
Additionally, CVE-2026-24858, a zero-day? vulnerability, was exploited to log into FortiGate? devices using compromised FortiCloud accounts. This attack path was distinct and not merely a patch bypass, indicating a sophisticated level of exploitation. The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE?-2025-59718 to its Known Exploited Vulnerabilities catalog, urging organizations to remediate by January 23, 2026.
What's at Risk
The attacks have significant implications for organizations using FortiGate? firewalls. Once inside, attackers executed commands to extract full configuration file?s, which are stored using a reversible encryption scheme. This allowed them to decrypt sensitive service account credentials, particularly for LDAP and Active Directory (AD) accounts. With these credentials, attackers could pivot into internal networks, posing a severe risk to organizational security.
The incidents reveal a pattern where attackers not only exploit high-severity vulnerabilities but also utilize lower-skill methods, such as scanning for open FortiGate? instances and attempting logins with weak credentials. This lowers the barrier for entry, making it easier for less experienced hackers to gain access.
Patch Status
Fortinet has responded to these vulnerabilities by issuing firmware? patches that address the identified flaws. Organizations are strongly encouraged to apply these patches immediately. The patches are crucial for restoring security and functionality, particularly for the Single Sign-On (SSO) feature, which was temporarily suspended due to the exploits.
Furthermore, organizations should implement a robust log retention policy, with a minimum of 14 days recommended, though 60 to 90 days is ideal. Insufficient log retention has hindered investigations, making it difficult to identify the initial access vector.
Immediate Actions
To protect against these vulnerabilities, organizations should take several immediate actions:
- Apply all available firmware? patches for CVE?-2025-59718, CVE?-2025-59719, and CVE?-2026-24858.
- Rotate all LDAP? and AD credentials linked to FortiGate? appliances after any suspected compromise.
- Enforce strict administrative access controls, eliminating default or weak credentials.
- Monitor for unauthorized local admin account creation on FortiGate? devices.
- Regularly audit settings to restrict unauthorized workstation joins to the domain.
By taking these steps, organizations can significantly reduce their risk of falling victim to these ongoing attacks.
Cyber Security News