← Back to Tech & Science

CISA Orders Federal Agencies to Patch Actively Exploited Fortinet Vulnerability

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

WASHINGTON — The Cybersecurity and Infrastructure Security Agency (CISA) has directed all federal agencies to patch a critical vulnerability in Fortinet network security devices by Friday, citing active exploitation by threat actors.

The directive, issued on Sunday, April 5, 2026, mandates immediate remediation of the flaw, identified as CVE-2026-12345. CISA classified the vulnerability as critical due to its potential to allow remote code execution and unauthorized access to sensitive government networks. The agency stated that the vulnerability is being actively exploited in the wild, necessitating urgent action to prevent data breaches and network compromise.

Fortinet, a leading provider of cybersecurity infrastructure, released a security advisory on Saturday addressing the issue. The company confirmed the existence of the vulnerability within its FortiOS and FortiGate operating systems, which are widely deployed across federal and private sector networks. Fortinet has made patches available for affected versions, urging customers to update their systems immediately.

The vulnerability affects a range of Fortinet products, including firewalls, secure web gateways, and unified threat management appliances. Security researchers have observed malicious actors leveraging the flaw to infiltrate networks, steal credentials, and deploy ransomware. The active exploitation has heightened concerns among federal officials about the security of critical infrastructure and government communications.

CISA’s directive aligns with the Federal Information Security Modernization Act (FISMA), which requires federal agencies to maintain robust cybersecurity defenses. The agency emphasized that non-compliance could expose federal systems to significant risks, including unauthorized access to classified information and disruption of essential services.

Federal agencies are expected to coordinate with their IT departments to assess the scope of the vulnerability within their networks and implement the necessary patches. CISA has provided technical guidance and support to assist agencies in the remediation process. The agency also urged private sector organizations to take similar action to protect their own infrastructure.

The incident underscores the ongoing challenges faced by government agencies in maintaining cybersecurity in an increasingly hostile digital environment. As threat actors continue to develop sophisticated methods of exploitation, federal officials remain vigilant in their efforts to safeguard national security interests.

Questions remain regarding the full extent of the exploitation and whether any federal agencies have already been compromised. CISA has not disclosed specific details about the threat actors involved or the methods used in the attacks. The agency continues to monitor the situation and will provide updates as more information becomes available.