By ThreatListPro Security Team · Published March 14, 2026 · Last verified: March 14, 2026

The 2025–2026 Fortinet VPN Attack Surge

Fortinet SSL VPN has become the number-one target for VPN brute force campaigns worldwide. A perfect storm of critical vulnerabilities, massive install base, and easily discoverable login portals has made FortiGate the preferred target for credential-based attacks—even on fully patched devices.

The numbers tell the story. VPN brute force attacks targeting FortiGate devices surged 300% between 2024 and early 2026. In February 2025, security researchers documented a massive botnet scanning campaign involving over 24,000 IP addresses specifically targeting FortiGate SSL VPN endpoints. The campaign used coordinated credential-stuffing techniques across rotating residential and cloud IPs, making traditional rate limiting almost useless.

Multiple critical CVEs accelerated the targeting. CVE-2024-21762 (CVSS 9.6, out-of-bound write in SSL VPN) and CVE-2023-27997 (CVSS 9.2, heap buffer overflow in SSL VPN pre-authentication) put FortiGate in the spotlight. Even after organizations patched these vulnerabilities, their FortiGate devices remained on attacker target lists. Patching closes the exploit, but it does not stop credential-based brute force attacks that require no vulnerability at all.

Key insight: Patching your FortiGate protects against CVE exploitation, but it does nothing to stop brute force credential attacks. Attackers who discovered your FortiGate through CVE scanning will continue attacking it with password campaigns indefinitely.

Why FortiGate Is Disproportionately Targeted

FortiGate is not the only VPN platform under attack—Palo Alto GlobalProtect, Cisco AnyConnect, and SonicWall all face brute force campaigns. But FortiGate takes a disproportionate share of the attacks for several specific reasons:

Attack Anatomy: How FortiGate VPN Brute Force Works

Understanding how these attacks operate is essential for defending against them. Here is the typical attack chain targeting FortiGate SSL VPN:

Step 1: Discovery

Botnets continuously scan the IPv4 address space on ports 443 and 10443 (the default FortiGate SSL VPN ports), looking for the /remote/login path. When a FortiGate SSL VPN portal responds, the bot fingerprints it by examining HTTP response headers, HTML content, and TLS certificate details. This scan runs 24/7 and discovers new FortiGate instances within hours of them going online.

Step 2: Identification

Once a FortiGate is discovered, the bot confirms the target by checking response characteristics specific to FortiOS. It may also attempt to determine the FortiOS version to identify potential CVE vulnerabilities. The target IP, port, and version information are added to a centralized target database shared across the botnet.

Step 3: Credential Attack

The botnet launches credential attacks from rotating IPs—often hundreds or thousands of different source addresses. A typical campaign involves:

Step 4: Persistence

These campaigns do not stop after a few hours. Botnets maintain target lists and return repeatedly—daily, weekly, sometimes for months. Even if no credentials are compromised, the sustained attack causes account lockouts, log noise, helpdesk overload, and authentication infrastructure strain.

Scale of the problem: The February 2025 FortiGate scanning campaign used over 24,000 unique source IPs in a single coordinated wave. Traditional approaches like manually blocking IPs or setting rate limits per source address cannot keep up with this volume.

Immediate Defenses

Here are the most effective defenses for FortiGate SSL VPN brute force, ranked by how quickly you can deploy them:

1. IP Blocklist via External Threat Feed (5 Minutes)

The fastest defense available. FortiGate natively supports External Threat Feeds (also called External Block Lists) under Security Fabric > External Connectors. You paste a blocklist URL—such as ThreatListPro’s curated VPN brute force list—and FortiGate automatically downloads and enforces it.

ThreatListPro’s blocklist contains IP addresses actively engaged in VPN brute force attacks, updated every 60 seconds. When configured as an External Threat Feed, FortiGate blocks these IPs at the perimeter before they can submit a single login attempt. No authentication load, no account lockouts, no log noise from known attackers.

Why this is the fastest solution: No client software to deploy. No user training. No changes to your authentication infrastructure. One FortiGate configuration change and known attacker IPs are blocked at the perimeter. Total setup time: under 5 minutes. See our FortiGate setup guide for step-by-step instructions.

2. Local-in Policy Rate Limiting (30 Minutes)

FortiGate local-in policies allow you to rate-limit connections destined for the FortiGate itself, including SSL VPN. You can set thresholds like “no more than 10 connections per minute per source IP to port 443.” This slows down brute force bots significantly but requires careful tuning—set the limit too low and you block legitimate users connecting from NAT’d networks or shared IPs.

Local-in policies are particularly effective when combined with an IP blocklist. The blocklist handles known attackers, while rate limiting catches new attackers not yet on the list.

3. FortiToken MFA (Weeks)

Multi-factor authentication is the gold standard for VPN security. FortiToken (hardware or mobile) adds a second factor that prevents credential-only access. Even if an attacker guesses a correct password, they cannot complete authentication without the token.

However, MFA rollout is a significant project. You need to procure FortiTokens, configure the FortiAuthenticator or FortiGate token server, enroll every user, handle exceptions for service accounts, and provide user support during the transition. For organizations with hundreds of users, this typically takes 4 to 8 weeks.

Important: MFA prevents successful compromise but does not stop the attacks themselves. Your users will still experience account lockouts from failed password attempts that occur before the MFA challenge. An IP blocklist stops the attacks at the perimeter, preventing both compromise and lockouts.

4. Certificate-Based Authentication (Months)

The most robust solution: require a client certificate for SSL VPN connections. Without the correct certificate, FortiGate refuses to present the login page at all—the attacker cannot even attempt a password. This completely eliminates brute force attacks against your SSL VPN.

The deployment complexity is significant. You need an internal PKI or integration with a third-party CA, an MDM solution to distribute certificates to managed devices, a process for certificate renewal and revocation, and a plan for BYOD or contractor access. Expect a 3 to 6 month deployment timeline.

FortiGate-Specific Configuration Tips

Beyond the layered defenses above, these FortiGate-specific settings reduce your attack surface immediately:

The Path Forward

Defending FortiGate SSL VPN against brute force requires a layered approach. No single solution is sufficient, but the order in which you deploy them matters enormously:

ThreatListPro works alongside all of these defenses. It is not a replacement for MFA or certificate auth—it is the immediate-relief layer that protects your FortiGate while you plan and execute those longer-term projects. With blocklist updates every 60 seconds, new attacker IPs are blocked automatically without any manual intervention.

Frequently Asked Questions

Why are Fortinet SSL VPN attacks increasing in 2026?

Multiple critical CVEs (CVE-2024-21762, CVE-2023-27997) put FortiGate in the spotlight, and massive botnet scanning campaigns in February 2025 specifically targeted FortiGate SSL VPN at unprecedented scale. Even after patching, FortiGate’s 500,000+ device install base and easily identifiable login pages make it the highest-volume target for VPN credential attacks.

How do I protect my FortiGate from VPN brute force?

Start with an IP blocklist via FortiGate’s External Threat Feed feature—this blocks known attackers at the perimeter in under 5 minutes. Follow up with local-in policy rate limiting, FortiToken MFA, and eventually certificate-based authentication. Layer these defenses for maximum protection, starting with the fastest to deploy.

Does ThreatListPro work with FortiGate External Threat Feed?

Yes. ThreatListPro provides a plain-text IP blocklist URL that you paste directly into FortiGate’s External Threat Feed configuration under Security Fabric > External Connectors. FortiGate pulls the list automatically and blocks all listed IPs at the firewall level. Setup takes under 5 minutes and the list updates every 60 seconds.

What CVEs affect Fortinet SSL VPN?

Key CVEs include CVE-2024-21762 (CVSS 9.6, out-of-bound write), CVE-2023-27997 (CVSS 9.2, heap buffer overflow), CVE-2022-42475 (CVSS 9.3, heap buffer overflow), and CVE-2024-23113 (format string vulnerability). Even fully patched devices remain targets for credential-based brute force attacks, which do not rely on any CVE.

How many FortiGate devices are exposed to the internet?

Security researchers estimate over 36,000 FortiGate devices with SSL VPN enabled are directly exposed and discoverable via Shodan and Censys. Fortinet’s total install base exceeds 500,000 devices globally. Many have SSL VPN enabled by default, even when not actively used.