Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FortiGate Firewall Breaches Exploit Critical Vulnerabilities

FortiGate Firewall Breaches Exploit Critical Vulnerabilities

Posted on March 15, 2026 By CWS

In early 2026, a wave of cyber intrusions targeted FortiGate Next-Generation Firewalls (NGFW), allowing attackers to gain persistent access within enterprise networks. These breaches were disrupted by security measures during the lateral movement phase, preventing attackers from fully realizing their goals.

Exploiting FortiGate Vulnerabilities

The attacks, identified by SentinelOne, exploited three critical vulnerabilities in Fortinet’s systems, disclosed between December 2025 and February 2026. Two major vulnerabilities, CVE-2025-59718 and CVE-2025-59719, both with a CVSS score of 9.8, involved improper cryptographic signature verification, enabling unauthorized access through crafted SAML tokens. The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-59718 to its catalog of known exploited vulnerabilities, mandating remediation by January 2026.

A zero-day vulnerability, CVE-2026-24858, emerged in January 2026, allowing attackers to bypass authentication using FortiCloud accounts. Fortinet responded by temporarily suspending FortiCloud single sign-on (SSO) and deploying necessary firmware patches.

Credential Theft via Configuration Files

Once inside the network, attackers executed commands to extract FortiGate configuration files. The reversible encryption of these files enabled the decryption of embedded service account credentials, particularly affecting LDAP and Active Directory accounts. This access allowed attackers to penetrate deeper into the internal network.

In one incident, threat actors set up a local admin account named “support” and configured permissive firewall policies, facilitating unrestricted network traffic. The attackers later used stolen credentials to authenticate and join rogue workstations to the corporate domain, triggering security alerts that eventually halted further progression.

Advanced Attack Tactics and Mitigations

In another breach, attackers swiftly established local admin accounts and accessed internal servers using harvested credentials. They deployed Remote Monitoring and Management (RMM) tools from cloud storage, and concealed their activities using advanced techniques like DLL side-loading.

To mitigate such threats, SentinelOne recommends organizations maintain at least 14 days of FortiGate log retention, with a preference for 60 to 90 days. Key defensive measures include applying all available Fortinet firmware patches, rotating compromised LDAP and AD credentials, enforcing robust access controls, and monitoring unauthorized admin account creations.

Additionally, auditing mS-DS-MachineAccountQuota settings can prevent unauthorized device additions to the domain, and ensuring active monitoring of endpoint detection and response (EDR) telemetry can provide critical insights into network activities.

For more updates on cybersecurity, follow us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:Active Directory, credential theft, CVE, cyber attacks, Cybersecurity, firewall vulnerabilities, Fortigate, Fortinet, LDAP credentials, log retention, network breaches, network security, RMM tools, SentinelOne

Post navigation

Previous Post: OpenClaw AI Vulnerabilities Pose Security Threats
Next Post: Microsoft Issues Urgent Patch for Windows 11 Security Flaws

Related Posts

Reflectiz Now Available on the Datadog Marketplace Reflectiz Now Available on the Datadog Marketplace Cyber Security News
RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor RedNovember Hackers Attacking Government and Technology Organizations to Deploy Backdoor Cyber Security News
Linux Kernel’s KSMBD Subsystem Vulnerability Let Remote Attackers Exhaust Server Resources Linux Kernel’s KSMBD Subsystem Vulnerability Let Remote Attackers Exhaust Server Resources Cyber Security News
Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Cyber Security News
Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild Cyber Security News
Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Meta to Cease Instagram E2EE Messaging by 2026
  • Loblaw Data Breach Exposes Customer Information
  • Microsoft Issues Urgent Patch for Windows 11 Security Flaws
  • FortiGate Firewall Breaches Exploit Critical Vulnerabilities
  • OpenClaw AI Vulnerabilities Pose Security Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Meta to Cease Instagram E2EE Messaging by 2026
  • Loblaw Data Breach Exposes Customer Information
  • Microsoft Issues Urgent Patch for Windows 11 Security Flaws
  • FortiGate Firewall Breaches Exploit Critical Vulnerabilities
  • OpenClaw AI Vulnerabilities Pose Security Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News