Fortinet has issued patches for three critical vulnerabilities in its FortiGate Next-Generation Firewall (NGFW) products that were actively exploited in a targeted intrusion campaign between December 2025 and February 2026. The attackers leveraged the flaws to gain administrative access, exfiltrate device configurations containing sensitive credentials, and attempt lateral movement within enterprise networks. Two of the vulnerabilities, CVE-2025-59718 and CVE-2025-59719, are authentication bypass flaws rated 9.8 critical. The third, CVE-2026-24858, was a zero-day also rated 9.8 critical. Due to active exploitation, CISA has added CVE-2025-59718 to its Known Exploited Vulnerabilities (KEV) list, mandating immediate action for federal agencies and signaling high risk for all organizations.
The attack campaign leveraged a combination of three distinct critical vulnerabilities to compromise FortiGate firewalls:
CVE-2025-59718 (CVSS 9.8, KEV): An improper cryptographic signature verification vulnerability. An unauthenticated, remote attacker can send a specially crafted SAML token to bypass authentication and gain administrative access. This was the primary vector for initial access.
CVE-2025-59719 (CVSS 9.8): A similar improper cryptographic signature verification flaw, also allowing for remote authentication bypass with a crafted SAML token.
CVE-2026-24858 (CVSS 9.8): A zero-day vulnerability that was exploited by attackers to log into already compromised FortiGate devices, likely as a secondary access method or persistence mechanism.
These vulnerabilities were actively exploited as zero-days in a coordinated campaign before patches were available. The attackers' goal was to gain initial access to enterprise networks by compromising the edge firewalls. Once they gained administrative access via the SAML bypass, their primary post-exploitation action was to execute commands to download the firewall's complete configuration file. This file is a treasure trove of sensitive information, including hashed passwords and, critically, clear-text credentials for service accounts (e.g., LDAP, RADIUS) used by the firewall to authenticate with other enterprise services. The attackers intended to use these stolen credentials to move laterally into the broader corporate network. Fortunately, the attacks were reportedly stopped before the adversaries achieved their ultimate objectives.
The impact of exploiting these vulnerabilities is severe. A successful attack grants the adversary administrative control over a core network security device. This leads to several critical business impacts:
execute backup config).Immediate action is required to mitigate the risk from these actively exploited vulnerabilities.
Immediately apply the security patches provided by Fortinet to remediate the vulnerabilities.
Mapped D3FEND Techniques:
Rotate all credentials stored on the firewall, including local admin accounts and service accounts for LDAP/RADIUS, as they may have been compromised.
Restrict network access to the firewall's management interface to a limited set of trusted internal IP addresses.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats