Fortinet has issued patches for three critical vulnerabilities in its FortiGate Next-Generation Firewall (NGFW) products that were actively exploited in a targeted intrusion campaign between December 2025 and February 2026. The attackers leveraged the flaws to gain administrative access, exfiltrate device configurations containing sensitive credentials, and attempt lateral movement within enterprise networks. Two of the vulnerabilities, CVE-2025-59718 and CVE-2025-59719, are authentication bypass flaws rated 9.8 critical. The third, CVE-2026-24858, was a zero-day also rated 9.8 critical. Due to active exploitation, CISA has added CVE-2025-59718 to its Known Exploited Vulnerabilities (KEV) list, mandating immediate action for federal agencies and signaling high risk for all organizations.
The attack campaign leveraged a combination of three distinct critical vulnerabilities to compromise FortiGate firewalls:
CVE-2025-59718 (CVSS 9.8, KEV): An improper cryptographic signature verification vulnerability. An unauthenticated, remote attacker can send a specially crafted SAML token to bypass authentication and gain administrative access. This was the primary vector for initial access.
CVE-2025-59719 (CVSS 9.8): A similar improper cryptographic signature verification flaw, also allowing for remote authentication bypass with a crafted SAML token.
CVE-2026-24858 (CVSS 9.8): A zero-day vulnerability that was exploited by attackers to log into already compromised FortiGate devices, likely as a secondary access method or persistence mechanism.
These vulnerabilities were actively exploited as zero-days in a coordinated campaign before patches were available. The attackers' goal was to gain initial access to enterprise networks by compromising the edge firewalls. Once they gained administrative access via the SAML bypass, their primary post-exploitation action was to execute commands to download the firewall's complete configuration file. This file is a treasure trove of sensitive information, including hashed passwords and, critically, clear-text credentials for service accounts (e.g., LDAP, RADIUS) used by the firewall to authenticate with other enterprise services. The attackers intended to use these stolen credentials to move laterally into the broader corporate network. Fortunately, the attacks were reportedly stopped before the adversaries achieved their ultimate objectives.
The impact of exploiting these vulnerabilities is severe. A successful attack grants the adversary administrative control over a core network security device. This leads to several critical business impacts:
execute backup config).Immediate action is required to mitigate the risk from these actively exploited vulnerabilities.
Immediately apply the security patches provided by Fortinet to remediate the vulnerabilities.
Mapped D3FEND Techniques:
Rotate all credentials stored on the firewall, including local admin accounts and service accounts for LDAP/RADIUS, as they may have been compromised.
Restrict network access to the firewall's management interface to a limited set of trusted internal IP addresses.
Mapped D3FEND Techniques:
Start of the period during which the FortiGate vulnerabilities were actively exploited.
End of the initial active exploitation period reported by researchers.
Fortinet releases patches and details of the exploitation campaign.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.