Fortinet fixes FortiGate firewall vulnerabilities that allowed hackers to steal company credentials


  • SentinelOne Reports FortiGate NGFW Flaws Exploited in Early 2026
  • Three critical bugs (CVE-2025-59718, -59719, -2026-24858) allowed administrator access and persistence
  • Fortinet has released patches; companies urged to rotate credentials, enforce strict controls and monitor lateral moves

Earlier this year, cybercriminals exploited three vulnerabilities in FortiGate Next-Generation Firewalls (NGFW) to establish persistence and move laterally across the network. All recorded attacks were stopped before they could cause significant damage, and FortiGate has since released patches to mitigate the risk.

Between December 2025 and February 2026, SentinelOne security researchers observed several attacks exploiting three distinct vulnerabilities. The first two are tracked as CVE-2025-59718 and CVE-2025-59719 (severity score 9.8/10), and both are due to improper verification of cryptographic signatures. These allow unauthenticated attackers to send a crafted SAML token and thus gain administrative access to FortiGate devices without valid credentials.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top