Fortinet patches FortiGate Firewall vulnerabilities that allowed hackers to steal enterprise credentials



  • SentinelOne reports FortiGate NGFW flaws exploited in early 2026
  • Three critical bugs (CVE-2025-59718, -59719, -2026-24858) allowed administrator access and persistence
  • Patches issued by Fortinet; Companies are urged to rotate credentials, apply strict controls and monitor lateral movement.

Earlier this year, cybercriminals were exploiting three vulnerabilities in FortiGate next-generation firewalls (NGFWs) to establish persistence and move laterally across the network. All recorded attacks were stopped before they could cause significant damage and FortiGate has since released patches to mitigate the risk.

Between December 2025 and February 2026, SentinelOne security researchers observed multiple attacks exploiting three separate vulnerabilities. The first two are tracked as CVE-2025-59718 and CVE-2025-59719 (severity score 9.8/10), and both originate from inadequate verification of cryptographic signatures. These allow unauthenticated attackers to send a crafted SAML token and thereby gain administrative access to FortiGate devices without valid credentials.



Leave a Comment

Your email address will not be published. Required fields are marked *