Exploiting the Gatekeeper: How CVE-2026-24858 Turns FortiGate into an Initial Access Vector

Summary:

The exploitation of CVE-2026-24858 highlights a critical security weakness in which FortiGate devices, designed to act as perimeter defences, are being leveraged as initial access points into enterprise networks. Attackers exploit this vulnerability to extract configuration files containing sensitive service account credentials, particularly those integrated with identity systems such as Active Directory and LDAP.

This access enables unauthorized authentication, lateral movement, and in some cases full domain compromise. Weak configurations and insufficient logging further increase the risk by making detection difficult and allowing attackers to maintain persistence over extended periods. The issue underscores a broader systemic concern, where tightly integrated perimeter devices can become high-value targets that, if compromised, expose core enterprise infrastructure across sectors such as healthcare, government, and managed services.

Technical Description:

CVE-2026-24858 affects FortiGate next-generation firewall appliances by allowing unauthorizedaccess to sensitive system configuration data, either directly or through exploitation of weakauthentication mechanisms. Once access is obtained, attackers can extract configuration filescontaining encrypted service account credentials used for integration with identity services such asActive Directory and LDAP.

In observed cases, attackers were able to decrypt these credentials, exposing weaknesses in howsensitive information is stored or accessed within the device. Following initial access, adversarieshave been seen creating unauthorized administrative accounts and modifying firewall policies,enabling persistent and unrestricted control over the appliance and its associated network traffic.

Using the recovered credentials, attackers can authenticate against the enterprise identity infrastructure, facilitating lateral movement and privilege escalation. This includes enrolling rogue systems into the domain, conducting internal reconnaissance, and deploying remote access tools or malware to maintain persistence. In some instances, attackers have also exfiltrated critical assets such as the NTDS.dit database and SYSTEM registry hive to enable offline credential harvesting. The vulnerability effectively transforms a perimeter security device into a pivot point for deeper network compromise, while limited logging and monitoring capabilities delay detection and response

Topics Details
CVE CVE-2026-24858
CVSS 9.8
Vulnerability Type Sensitive Information Exposure / Improper Access Control
Affected Product Fortinet FortiGate NGFW Appliances
Patch Version Latest FortiOS update

Exploitation Demonstration:

  • Attackers scan for exposed FortiGate management interfaces and attempt exploitation of CVE-2026-24858 or use weak or previously leaked credentials to gain administrative access.
  • After gaining access, attackers create hidden administrator accounts such as “support” and modify firewall policies to maintain persistent, unrestricted access across network segments.
  • Configuration files are exported and decrypted using publicly available tools, revealing stored service account credentials associated with Active Directory or LDAP integrations.
  • These credentials are then used to authenticate to internal systems, allowing attackers to enroll rogue machines into the domain and expand their foothold within the environment.
  • Attackers conduct internal reconnaissance, deploy remote access tools or malware, and may exfiltrate sensitive data such as credential databases while maintaining persistence and evading detection due to limited logging visibility.

Ease of Exploitation:

The exploitation of CVE-2026-24858 is considered relatively straightforward for moderately skilled attackers, particularly when FortiGate management interfaces are exposed to the internet or protected by weak authentication mechanisms. The attack does not require advanced exploit development, as adversaries can leverage existing tools, automated scanning techniques, and publicly available scripts to gain access.

Once inside the device, attackers can retrieve configuration files using built-in system functionality, significantly reducing the technical barrier to entry. The presence of centrally stored service account credentials further simplifies post-compromise activities, as attackers can reuse decrypted credentials to access internal systems without requiring complex privilege escalation techniques. The combination of accessible attack surfaces, inadequate hardening, and high-value credential exposure makes this vulnerability both attractive and practical for real-world exploitation.

Conclusion:

CVE-2026-24858 illustrates the growing risk associated with treating perimeter security devices as inherently trusted components within enterprise environments. Exploitation of this vulnerability demonstrates how a single weakness in a network edge device can lead to full-scale compromise through credential exposure and abuse of identity integrations such as Active Directory and LDAP.

Observed attack patterns indicate that adversaries are capable not only of gaining initial access but also of maintaining persistence and conducting lateral movement with minimal resistance. Organizations must prioritize timely patching, enforce strict access controls, enhance logging and monitoring capabilities, and reassess trust assumptions around perimeter devices in order to reduce overall attack surface and prevent similar breaches.

Impact:

The impact of CVE-2026-24858 is significant, as it enables attackers to obtain high-privilege service account credentials, gain unauthorized access to critical identity systems such as Active Directory, and perform lateral movement across enterprise networks. Attackers can modify firewall configurations, manipulate network traffic, and exfiltrate sensitive data while maintaining persistent access.

Limited logging and monitoring capabilities further increase the risk by delaying detection and response, allowing attackers to remain undetected for extended periods. This can result in substantial operational disruption, data compromise, and long-term strategic impact on affected organizations.

IOC & Context Details:

Topics Details
Tactic Name Initial Access, Credential Access, Lateral Movement
Technique Name Exploitation of Remote Services, Credential Dumping, Internal Reconnaissance
Sub Technique Name Exploitation of Network Appliance Vulnerability, Extraction of Configuration Files, Rogue System Enrollment
Attack Type Vulnerability
Targeted Applications FortiGate NGFW Appliances, Active Directory, LDAP
Region Impacted Global
Industry Impacted Healthcare, Government, Managed Service Providers
IOC’s Domains:
ndibstersoft[.]com
neremedysoft[.]com
fastdlvrss[.]s3[.]us-east-1[.]amazonaws[.]com

IP Addresses:
185.156.73[.]62
185.242.246[.]127
193.24.211[.]61

URLs:
hxxps://fastdlvrss[.]s3[.]us-east-1[.]amazonaws[.]com/paswr.zip – Incident 2, URL hosting weaponized Java application & payloads
hxxps://storage.googleapis[.]com/apply-main/windows_agent_x64[.]msi – Incident 2, URL hosting Pulseway RMM
CVE CVE-2026-24858

Recommended Actions:

  • Apply the latest FortiOS patches and updates to remediate CVE-2026-24858 and related vulnerabilities.
  • Enforce strong, unique passwords and multi-factor authentication for all FortiGate administrative accounts.
  • Restrict access to management interfaces by limiting connectivity to trusted IP addresses and internal networks only.
  • Enable comprehensive logging on FortiGate devices and forward logs to a centralized security information and event management system, retaining logs for sufficient periods.
  • Conduct regular audits of firewall configurations and remove unnecessary or default administrative accounts.
  • Monitor for unusual administrative activity, unauthorized account creation, or unexpected firewall policy changes.
  • Ensure that sensitive configuration data and stored credentials are securely encrypted and managed according to best practices.
  • Perform regular internal network assessments and penetration testing to identify potential lateral movement paths and configuration weaknesses.

Reference:

https://www.sentinelone.com/blog/fortigate-edge-intrusions/

https://thehackernews.com/2026/03/fortigate-devices-exploited-to-breach.html