Live Threats
[CVE-2026-1234]Windows CLFS Driver zero-day — privilege escalation to SYSTEM, CISA KEV confirmed, patch immediately|
[CVE-2026-0891]Fortinet FortiOS authentication bypass — unauthenticated admin access, active exploitation in the wild|
[CVE-2026-2201]Palo Alto PAN-OS command injection — remote code execution on firewall management plane, CISA KEV listed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed including 3 zero-days, deploy immediately|
[BREACH]Healthcare sector breach — 2.3M patient records exposed, PHI including SSNs and medical histories compromised|
[CVE-2026-1887]Chrome V8 type confusion RCE — remote code execution via malicious web page, update Chrome immediately|
[COMPLIANCE]PCI DSS 4.0.1 MFA deadline — mandatory multi-factor authentication enforcement now in effect for all merchants|
[CVE-2026-3310]Cisco IOS XE privilege escalation — authenticated users gain root on affected switches and routers, patch now|
[RANSOMWARE]LockBit 4.0 SMB campaign — RDP brute-force targeting small businesses, double-extortion, 72-hour ransom window|
[ADVISORY]Adobe Acrobat PDF phishing wave — malicious PDFs bypassing email filters, credential harvesting at scale|
[CVE-2026-1234]Windows CLFS Driver zero-day — privilege escalation to SYSTEM, CISA KEV confirmed, patch immediately|
[CVE-2026-0891]Fortinet FortiOS authentication bypass — unauthenticated admin access, active exploitation in the wild|
[CVE-2026-2201]Palo Alto PAN-OS command injection — remote code execution on firewall management plane, CISA KEV listed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed including 3 zero-days, deploy immediately|
[BREACH]Healthcare sector breach — 2.3M patient records exposed, PHI including SSNs and medical histories compromised|
[CVE-2026-1887]Chrome V8 type confusion RCE — remote code execution via malicious web page, update Chrome immediately|
[COMPLIANCE]PCI DSS 4.0.1 MFA deadline — mandatory multi-factor authentication enforcement now in effect for all merchants|
[CVE-2026-3310]Cisco IOS XE privilege escalation — authenticated users gain root on affected switches and routers, patch now|
[RANSOMWARE]LockBit 4.0 SMB campaign — RDP brute-force targeting small businesses, double-extortion, 72-hour ransom window|
[ADVISORY]Adobe Acrobat PDF phishing wave — malicious PDFs bypassing email filters, credential harvesting at scale|
View All
Hackers Are Logging Into Fortinet Firewalls Right Now — No Password Required
BREACHCRITICALCVE-2026-1337

Hackers Are Logging Into Fortinet Firewalls Right Now — No Password Required

Published April 17, 2026
4 min read
Source: CISA / Fortinet PSIRT
SHARE:
Affected Systems
FortiOS 7.4.xFortiOS 7.5.xFortiOS 7.6.xFortiProxy 7.4.xFortiProxy 7.6.x
Executive Summary

CVE-2026-1337 lets attackers walk straight past authentication on Fortinet FortiOS and FortiProxy — no credentials, no user interaction, full admin access. Nation-state groups and ransomware crews are already scanning for exposed management interfaces. CISA made it mandatory to patch. If your firewall is Fortinet, stop reading and go patch it.

What Happened

Fortinet's Product Security Incident Response Team (PSIRT) disclosed a critical authentication bypass vulnerability tracked as CVE-2026-1337 affecting FortiOS and FortiProxy. The vulnerability exists in the administrative management interface and allows unauthenticated remote attackers to bypass authentication controls and gain full administrative access to affected devices. CISA confirmed active exploitation in the wild and added this CVE to its Known Exploited Vulnerabilities (KEV) catalog on April 15, 2026.

Who Is Affected

Organizations running FortiOS versions 7.4.x through 7.6.x and FortiProxy 7.4.x through 7.6.x are affected. This includes a large number of enterprise firewalls, SD-WAN appliances, and network security gateways deployed by businesses of all sizes. Fortinet is one of the most widely deployed network security vendors globally, making this vulnerability particularly impactful. If your organization uses Fortinet products for perimeter security, you should assume you are affected until you verify your version and patch status.

How Attackers Are Exploiting It

Threat intelligence from multiple sources indicates that nation-state affiliated threat actors and ransomware groups are actively scanning the internet for vulnerable Fortinet management interfaces. Once access is gained, attackers are deploying persistent backdoors, creating rogue administrator accounts, and using the compromised firewall as a pivot point to access internal network resources. In several confirmed incidents, attackers maintained access for weeks before detection. The exploitation does not require any user interaction — simply having the management interface reachable from the internet is sufficient for compromise.

Immediate Actions Required

Fortinet has released patches for all affected versions. You should update to FortiOS 7.4.5, 7.5.3, or 7.6.2 (or later) immediately. If patching cannot be done immediately, restrict access to the management interface to trusted IP addresses only using local-in policies. Disable internet-facing management access entirely if possible. Review your administrator account list for any accounts you did not create. Check authentication logs for access from unexpected IP addresses, particularly from foreign countries or known malicious IP ranges.

What Segler.Net Recommends

Our team is actively reaching out to clients who use Fortinet products to schedule emergency patching. If you are a Segler.Net managed services client, we are already reviewing your exposure. If you manage your own Fortinet infrastructure, contact us immediately for assistance. We can perform a rapid vulnerability assessment, apply the patch, and review your logs for signs of prior compromise. Do not delay — active exploitation means every hour of exposure increases your risk of a serious breach.

Key Takeaways & Action Items
  • Apply Fortinet's patch immediately — do not wait for your next maintenance window
  • Restrict FortiOS management interface access to trusted IP ranges only
  • Check your logs for signs of unauthorized admin access since March 2026
  • CISA mandatory remediation deadline applies to all federal agencies — SMBs should treat this with equal urgency
  • If you cannot patch immediately, disable the management interface from internet exposure
Share This

Need Help With This Threat?

Our San Antonio security team can assess your exposure, apply patches, and protect your business before attackers strike.

Stay ahead of the next threat

Get weekly security alerts — breaches, patch updates, compliance news, and threat intel — delivered free to your inbox every week.

Breach alerts
Patch roundups
Compliance news
No spam, ever
Talk with Us