Fortinet Patches FortiGate Firewall Vulnerabilities That Allowed Hackers to Steal Corporate Credentials


  • SentinelOne reports FortiGate NGFW flaws exploited in early 2026
  • Three critical bugs (CVE-2025-59718, -59719, -2026-24858) enabled administrator access and persistence
  • Fortinet issued patches; companies are encouraged to rotate credentials, enforce strong controls and monitor for lateral movement

At the start of the year, cybercriminals exploited three vulnerabilities in FortiGate Next-Generation Firewalls (NGFW) to establish persistence and move laterally through the network. All recorded attacks were stopped before they could do any meaningful damage, and FortiGate has since issued patches to mitigate the risk.

Between December 2025 and February 2026, security researchers SentinelOne observed several attacks that exploited three different vulnerabilities. The first two are tracked as CVE-2025-59718 and CVE-2025-59719 (severity score 9.8/10), and both are rooted in improper verification of cryptographic signatures. These allow unauthorized attackers to send a crafted SAML token and thereby gain administrative access to FortiGate units without valid credentials.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top