The Patch That Did Not Close the Door
Fortinet disclosed in April 2025 that a threat actor had devised a novel post-exploitation technique to maintain persistent access to FortiGate devices long after the original vulnerabilities were patched. The initial compromise campaigns date back to 2023, leveraging three critical CVEs: CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. What made this attack exceptional was not the initial breach but what happened next: attackers created symbolic links inside the SSL-VPN language files directory that pointed to the device’s root filesystem. Because these language files are publicly accessible on SSL-VPN-enabled devices, the symlink gave attackers persistent read-only access to sensitive files, including device configurations, credentials, and certificates.
The Shadowserver Foundation confirmed that 16,620 internet-exposed FortiGate devices were compromised with this backdoor as of April 2025. The geographic breakdown reveals a global footprint: Asia led with 7,886 affected devices, followed by Europe at 3,766, North America at 3,217, South America at 1,054, Africa at 399, and Oceania at 298.
How the Symlink Persistence Mechanism Works
The technique exploits a design characteristic of FortiOS rather than a software bug. SSL-VPN-enabled FortiGate devices serve language files from a user-accessible directory. Attackers with prior access created a symbolic link within this directory pointing to the root filesystem. Because the symlink existed in the user filesystem rather than the system filesystem, standard patching and firmware updates did not remove it. The FortiOS integrity-checking mechanisms also failed to flag the modification, as the symlink resided in a space normally considered safe.
The result: even after administrators applied patches for the original CVEs, the symlink remained in place. Attackers could browse to the publicly accessible language file URL and traverse the symlink to read any file on the device, including running configurations with plaintext or hashed credentials, VPN user databases, and LDAP bind credentials.
This is not theoretical. The Canadian Centre for Cyber Security, French CERT, and CISA all issued advisories confirming active exploitation. In February 2026, researchers at ITRES Labs documented CVE-2025-68686, a double-slash technique that bypassed Fortinet’s initial symlink patch, extending the threat window further.
Advertisement
The Underlying Vulnerabilities
The three CVEs that enabled the initial compromise represent some of the most critical FortiOS flaws in recent years. CVE-2024-21762 is an out-of-bounds write vulnerability in FortiOS SSLVPNd with a CVSS score of 9.8, allowing remote unauthenticated attackers to execute arbitrary code via crafted HTTP requests. CISA added it to the Known Exploited Vulnerabilities catalog in February 2024. CVE-2023-27997 is a heap buffer overflow in the SSL-VPN component, and CVE-2022-42475 is a heap-based buffer overflow that was actively exploited as a zero-day.
All three vulnerabilities have patches available, but the symlink persistence mechanism means that patching alone is insufficient. Organizations that patched without performing post-compromise analysis may have unknowingly left the backdoor in place.
CISA and Global Response
The U.S. Cybersecurity and Infrastructure Security Agency issued an advisory urging organizations to take immediate action beyond patching. Recommended steps include upgrading to FortiOS versions 7.6.2, 7.4.7, 7.2.11, 7.0.17, or 6.4.16, which specifically remove the malicious symlink files. CISA also advised resetting all credentials associated with SSL-VPN functionality, including user accounts, LDAP bind credentials, and pre-shared keys.
For organizations unable to patch immediately, CISA recommended disabling SSL-VPN functionality entirely until the upgrade could be performed. Fortinet’s own advisory emphasized reviewing device configurations for unauthorized symlinks and conducting forensic analysis on any device that had SSL-VPN enabled during the vulnerability window.
What Makes This Attack Significant
This incident represents a paradigm shift in how defenders should think about patching. Traditional vulnerability management operates on the assumption that applying a patch closes the security gap. The FortiGate symlink attack proves that sophisticated adversaries are now planning for patch deployment, pre-positioning persistence mechanisms that survive the remediation process. This forces organizations to adopt a more comprehensive approach that treats every patched vulnerability as a potential indicator of prior compromise requiring forensic investigation.
The scale, over 16,000 devices across six continents, also underscores how widely deployed FortiGate appliances are in critical infrastructure. Each compromised device potentially exposes not just the firewall configuration but the entire network topology, VPN credentials, and authentication infrastructure behind it.
Frequently Asked Questions
What is the FortiGate symlink persistence technique and why is it dangerous?
Attackers create symbolic links in FortiGate’s SSL-VPN language files directory that point to the device’s root filesystem. Because these language files are publicly accessible, the symlink gives attackers read-only access to all device files, including configurations and credentials. The technique survives standard patching because the symlink exists in the user filesystem, which firmware updates do not clean.
How can organizations detect if their FortiGate devices have been compromised?
Organizations should upgrade to FortiOS 7.6.2, 7.4.7, 7.2.11, 7.0.17, or 6.4.16, which contain specific checks to remove the malicious symlinks. After upgrading, conduct a forensic review of device configurations and check for unauthorized files in the SSL-VPN language directory. CISA also recommends resetting all credentials that may have been exposed.
Does patching FortiGate devices fix the symlink backdoor?
Standard patching alone does not remove the symlink. Only the specific FortiOS versions listed in the remediation advisory contain the logic to detect and remove the malicious symbolic link. Organizations that applied earlier patches without upgrading to these specific versions may still have the backdoor in place.
Sources & Further Reading
- Over 16,000 Fortinet Devices Compromised with Symlink Backdoor — BleepingComputer
- Fortinet Releases Advisory on New Post-Exploitation Technique — CISA
- Fortinet Warns Attackers Retain FortiGate Access Post-Patching — The Hacker News
- Over 14K Fortinet Devices Compromised via New Attack Method — Cybersecurity Dive
- Compromise and Persistent Access of Fortinet FortiOS Products — Canadian Centre for Cyber Security
- Hackers Exploit Old FortiGate Vulnerabilities, Use Symlink Trick — Help Net Security






