Recent findings have revealed serious vulnerabilities in Fortinet’s FortiGate Next-Generation Firewalls (NGFW). Three critical flaws, identified as CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858, were reported to enable unauthorized admin access, raising severe security concerns for users worldwide. With severity scores reaching 9.8/10, these vulnerabilities were allegedly exploited by cybercriminals earlier this year before being patched by Fortinet.
This situation is particularly pertinent for businesses relying on FortiGate devices for network protection. The exposure to such vulnerabilities means that organizations must act swiftly to safeguard their systems. Users should not only install Fortinet’s patches but also implement strong access controls and rotate existing credentials. This development affects a broad range of users who prioritize network security, especially those who handle sensitive or mission-critical data.
Fortinet offers a range of network security solutions that often compete with products from other well-known brands like Cisco and Palo Alto Networks. Typically, these firewalls cater to various business sizes, from small enterprises to large corporations, and their pricing can reflect that. Cisco’s firewalls, for example, may start at around $500, while high-end models can go up to several thousand dollars. Palo Alto Networks provides similar tiered solutions, often favored for their advanced features but priced at a premium. It’s essential to weigh the specifications and your organization’s unique needs to select the best option.
Ultimately, businesses should consider their security requirements and existing infrastructure before investing in any firewall solution. The critical nature of these recent vulnerabilities makes it imperative for organizations using FortiGate devices to be proactive. However, if you are looking for broader flexibility and perhaps a slightly more user-friendly interface, exploring alternatives like Cisco or Palo Alto Networks may be worth considering. It’s also important to note that if your organization is not prepared to implement the necessary security measures post-purchase, it may be prudent to evaluate other options to ensure adequate protection.
Source:
www.techradar.com