A comprehensive analysis of Fortinet’s exploitation crisis and why hospitals keep getting hit
Executive Summary
While the cybersecurity world focused on SonicWall’s troubles, Fortinet products have quietly become one of the most frequently exploited attack vectors in modern ransomware campaigns—with healthcare bearing the brunt of the damage. With 20 CVEs on CISA’s Known Exploited Vulnerabilities catalog and active exploitation by groups like Qilin, Akira, and Mora_001, Fortinet devices have become a favorite entry point for ransomware operators targeting hospitals, clinics, and healthcare providers.
In 2024 alone, healthcare suffered 444 reported cyber incidents (238 ransomware, 206 data breaches)—more than any other US critical infrastructure sector. A staggering 592 regulatory filings were submitted to HHS, impacting 259 million Americans. Behind many of these attacks: compromised Fortinet firewalls.
This isn’t a theoretical risk—it’s an ongoing crisis that’s disrupting patient care, canceling surgeries, and exposing sensitive medical records at an unprecedented scale.
The Current Crisis: Recent Fortinet Exploits
November 2025: FortiWeb Zero-Days (CVE-2025-64446 & CVE-2025-58034)
The Attack: In October 2025, attackers began exploiting CVE-2025-64446, a path traversal vulnerability in Fortinet’s FortiWeb web application firewall, to gain administrative access without authentication.
What makes this worse: Fortinet quietly patched the vulnerability on October 28 but didn’t publicly disclose it until November 14—17 days later—only confirming exploitation after security researchers independently discovered it.
Key Details:
- CVSS Score: 9.1-9.8 (Critical)
- Impact: Complete device takeover, administrative access
- Timeline: Exploited since early October, disclosed mid-November
- Added to CISA KEV: November 14, 2025 (7-day remediation deadline)
- Second vulnerability: CVE-2025-58034 (authenticated command injection) discovered being chained with the first
The Delayed Disclosure Problem: Security researcher Ryan Emmons from Rapid7 was scathing in his assessment: “Attackers often have first-mover advantage, and defenders rely heavily on vendor transparency… When a vendor has knowledge of product flaws and a patch is published, it’s imperative that defenders are given a heads-up notice with as much actionable information as possible. Obscurity hurts defenders more than it impedes attackers.”
By the time Fortinet publicly disclosed CVE-2025-64446, attackers had been exploiting it for over a month.
May-June 2025: Qilin Ransomware’s Coordinated Campaign
The Attack: The prolific Qilin ransomware group (responsible for over $50 million in 2024 ransoms alone) launched a coordinated campaign exploiting multiple Fortinet vulnerabilities simultaneously.
Targeted Vulnerabilities:
- CVE-2024-21762 (patched February 2024)
- CVE-2024-55591 (exploited as zero-day since November 2024)
- Multiple others in automated, partially-scripted attacks
Healthcare Impact:
- Synnovis attack: Crippled pathology services for several major NHS hospitals in London
- Over 10,000 appointments and procedures canceled (not 700+ as initially reported)
- Hospital services disrupted for weeks
- Geographic focus: Spanish-speaking countries initially, expanding globally
Threat intelligence firm PRODAFT assessed with “moderate confidence” that Qilin achieved initial access by exploiting FortiGate vulnerabilities, using partially automated tools to scan for and compromise vulnerable devices at scale.
For comprehensive analysis of Qilin’s rise to dominance, see our in-depth article: The Ransomware-as-a-Service Ecosystem in Late 2025: From LockBit’s Disruption to the Rise of Qilin, Akira, and DragonForce.
January-March 2025: Mora_001/SuperBlack Ransomware
The Attack: A new ransomware group called Mora_001, with suspected ties to the disbanded LockBit operation, deployed a novel ransomware strain dubbed “SuperBlack” after exploiting two Fortinet bugs.
Exploited Vulnerabilities:
- CVE-2024-55591 (authentication bypass)
- CVE-2025-24472 (authentication bypass via alternate path)
The LockBit Connection: Forescout researchers found SuperBlack closely resembles LockBit 3.0 ransomware, suggesting either:
- Current affiliation with LockBit remnants
- Use of leaked LockBit 3.0 builder from 2022
- Shared infrastructure and tools
CISA’s Urgent Response: CISA gave federal agencies just one week to patch CVE-2024-55591—one of the shortest deadlines ever issued—underscoring the severity of active exploitation.
May 2025: Zero-Day Exploitation (CVE-2025-32756)
The Attack: Multiple threat groups exploited a critical stack-based buffer overflow in Fortinet’s FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera platforms.
Key Details:
- CVSS Score: 9.6 (Critical)
- Impact: Remote code execution without authentication
- Affected Products: Unified communications, email security, network detection, video surveillance
- Exploitation: Fortinet confirmed in-the-wild exploitation before releasing patch
- Added to CISA KEV: May 2025
The Broader Pattern: GreyNoise reported a surge in scanning activity targeting Fortinet devices in early 2025, noting that 80% of similar traffic spikes have historically preceded CVE disclosures within six weeks.
Healthcare: The Primary Victim
Why Healthcare is Ransomware’s Favorite Target
Healthcare organizations face a perfect storm of vulnerabilities that make them ideal ransomware victims:
- Life-or-Death Pressure: Unlike other sectors, hospital downtime directly impacts patient care, creating immense pressure to pay ransoms quickly
- Valuable Data: Medical records fetch premium prices on dark web markets
- Legacy Systems: Many hospitals run outdated equipment that can’t be easily patched
- Limited Security Budgets: 42% of healthcare ransomware victims cited “lack of people and capacity” as contributing factor
- Regulatory Complexity: HIPAA and state breach notification laws add compliance pressure
- Consolidation Targets: Hospital mergers create larger, more lucrative targets
The 2024-2025 Healthcare Ransomware Catastrophe
By The Numbers:
- 444 reported incidents in 2024 (highest of any critical infrastructure sector)
- 238 ransomware attacks (second only to critical manufacturing’s 258)
- 206 data breaches
- 592 regulatory filings to HHS Office for Civil Rights
- 259 million Americans impacted (entire US population nearly affected)
- 66% of healthcare organizations hit by ransomware in 2024 (four-year high)
Major 2024-2025 Healthcare Incidents:
Change Healthcare (February 2024)
- Impact: 190 million Americans (largest healthcare breach in history)
- Attacker: ALPHV/BlackCat ransomware
- Damage: Disrupted prescription processing nationwide for weeks
- Congressional Response: Senate hearings, calls for enhanced CMS/HHS emergency powers
Ascension Health (May 2024)
- Scope: 142 hospitals across 19 states
- Impact: 5.6 million patients affected
- Downtime: Electronic health record systems offline for 4 weeks
- Consequences: Delayed care, manual workarounds, patient safety concerns
Blue Shield of California (Early 2025)
- Impact: 4.7 million individuals
- Part of: Larger series affecting multiple healthcare providers
HealthEquity (March 2024)
- Impact: 4.3 million patients
- Vector: Compromised partner device
The Shifting Tactics: Data Extortion Over Encryption
A troubling new trend has emerged in healthcare ransomware: attackers are increasingly skipping encryption entirely and focusing purely on data extortion.
2025 Healthcare Ransomware Statistics (Sophos Report):
- Only 34% of attacks resulted in encryption (down from 74% in 2024)
- 12% were extortion-only attacks (tripled from 4% in 2022-2023)
- Attacks stopped before encryption: Five-year high
- Mean recovery cost: $1.02 million (down 60% from 2024’s $2.57 million)
What This Means:
- Healthcare defenses are improving at detecting and stopping encryption
- Attackers are adapting by threatening to leak stolen data without encrypting anything
- Medical records, patient data, and research information are valuable enough to extort without disrupting systems
- Organizations still face massive HIPAA violations and reputational damage
Vulnerability Exploitation: The New Primary Vector
For the first time in three years, exploited vulnerabilities overtook credential-based attacks as the most common root cause of healthcare breaches in 2025, used in 33% of incidents.
Translation: Unpatched systems—including Fortinet firewalls—are now the #1 way attackers are breaching hospitals.
The 88 Ransomware Groups Targeting Healthcare
Sophos X-Ops identified 88 distinct threat groups targeting healthcare organizations in 2024-2025. The most prominent:
- GOLD FEATHER (Qilin) - Most active overall, $50M+ in 2024 ransoms, 81 attacks in June 2025 alone
- GOLD IONIC (INC Ransom) - Healthcare specialist
- GOLD HUBBARD (RansomHub) - Dominated until March 2025 disruption
- Akira - $244 million in total proceeds, fastest-moving attacks
- LockBit variants (including Mora_001/SuperBlack)
Qilin’s Major Healthcare Victims:
- Synnovis Laboratories (NHS): 10,000+ appointments canceled
- Covenant Health: 7,864 individuals affected (May 2025)
- Multiple healthcare facilities in coordinated August 2025 attacks
For detailed analysis of how these groups evolved after LockBit’s disruption, see: The Ransomware-as-a-Service Ecosystem in Late 2025.
Fortinet’s Four-Year Exploitation History: 20 CVEs on CISA KEV
Like SonicWall, Fortinet has become a persistent target for ransomware operators. With 20 vulnerabilities on CISA’s Known Exploited Vulnerabilities catalog, Fortinet ties SonicWall for second-worst among firewall vendors (behind only Ivanti’s 16 since January 2024).
Timeline of Major Fortinet Exploits
2019-2021: The Early Warning Signs
CVE-2019-19781 (Citrix, often deployed alongside Fortinet)
- Early indication that VPN/firewall appliances were becoming primary targets
- Set pattern for future campaigns
2022: Critical Buffer Overflow
CVE-2022-42475 (FortiOS - Buffer Overflow)
- CVSS: Critical
- Impact: Remote code execution
- Exploitation: Nation-state actors and ransomware groups
- Persistence Method: Attackers developed symlink-based persistence to survive patches
- Added to CISA KEV: 2022
The Persistence Problem: In April 2025, Fortinet warned that threat actors had developed a post-exploitation technique that maintains read-only access even after patching—affecting over 14,000 FortiGate devices globally.
2023: Continuing Pressure
CVE-2023-27997 (FortiOS - Heap Buffer Overflow)
- Impact: Pre-authentication remote code execution
- Targets: FortiOS, FortiProxy
- Exploitation: Active exploitation in nation-state campaigns
- Added to CISA KEV: 2023
CVE-2023-48788 (FortiClientEMS - SQL Injection)
- CVSS: 9.3 (Critical)
- Impact: Unauthorized code execution
- Target: Endpoint Management Server
- Added to CISA KEV: 2024
2024: Zero-Day Surge
CVE-2024-21762 (FortiOS/FortiProxy - Out-of-Bounds Write)
- Disclosed: February 2024
- CVSS: 9.6 (Critical)
- Impact: Remote code execution
- Exploitation: Qilin ransomware, various APT groups
- Added to CISA KEV: February 2024
- March 2024: Shadowserver found nearly 150,000 devices still vulnerable one month after CISA deadline
CVE-2024-55591 (FortiOS - Authentication Bypass) - THE BIG ONE FOR 2024-2025
-
Disclosed: December 2024 (exploited as zero-day since November 2024)
-
CVSS: 9.8 (Critical)
-
Impact: Complete device compromise without authentication Exploitation:
-
Mora_001/SuperBlack ransomware (January-March 2025)
-
Qilin ransomware (May-June 2025)
-
Multiple nation-state actors
-
Added to CISA KEV: January 2025
-
Federal Deadline: 7 days (one of shortest ever issued)
2025: Crisis Accelerates
CVE-2025-24472 (FortiOS/FortiProxy - Authentication Bypass via Alternate Path)
- Disclosed: January 2025
- CVSS: 8.1 (High)
- Impact: Super-admin privileges via crafted requests
- Exploitation: Used alongside CVE-2024-55591 by Mora_001 in January-March 2025 campaign
- Added to CISA KEV: March 2025
CVE-2025-32756 (Multiple Products - Stack Buffer Overflow)
- Disclosed: May 2025
- CVSS: 9.6 (Critical)
- Affected Products: FortiVoice, FortiMail, FortiNDR, FortiRecorder, FortiCamera
- Impact: Remote code execution without authentication
- Exploitation: Confirmed in-the-wild, starting with FortiVoice
- Added to CISA KEV: May 2025
CVE-2025-64446 (FortiWeb - Path Traversal/Authentication Bypass)
- Patched: October 28, 2025 (silently)
- Disclosed: November 14, 2025 (17 days later)
- CVSS: 9.1 (Critical)
- Impact: Complete administrative compromise
- Exploitation: Active since early October 2025
- Added to CISA KEV: November 14, 2025 (7-day deadline)
CVE-2025-58034 (FortiWeb - OS Command Injection)
- Disclosed: November 18, 2025
- Impact: Authenticated code execution
- Chaining: Used with CVE-2025-64446 for full compromise
- Added to CISA KEV: November 18, 2025
January 2025: Data Leak Crisis
In January 2025, the hacker collective “Belsen Group” leaked data from 15,000 Fortinet firewall configurations, obtained through exploitation of CVE-2022-42475.
Leaked Data Included:
- IP addresses
- Administrative passwords
- Complete firewall configurations
- Network topology information
Security researcher Kevin Beaumont confirmed the data’s authenticity by mapping it to internet-exposed Fortinet devices on Shodan.
The Pattern: Why Fortinet Keeps Getting Hit
- Widespread Deployment: Fortinet is one of the world’s largest firewall vendors, making it a high-value target
- Internet-Facing Management Interfaces: Many organizations expose administrative panels to the internet
- Complex Product Line: Multiple products (FortiOS, FortiProxy, FortiWeb, FortiMail, FortiVoice, etc.) expand attack surface
- Delayed Patching: Organizations struggle to patch on Fortinet’s timelines, especially in healthcare
- Post-Patch Persistence: Attackers have developed techniques to maintain access even after patching
- Zero-Day Exploitation: Multiple Fortinet products have been exploited as zero-days before patches exist
- Credential Harvesting: When devices are compromised, attackers steal configurations and credentials for future use
The 15,000 Device Leak: A Supply Chain Time Bomb
The January 2025 Belsen Group leak represents a ticking time bomb for organizations running Fortinet equipment. With administrative credentials, network configurations, and firewall rules exposed for 15,000 devices globally, attackers have a roadmap for future breaches.
Why This Matters:
- Credentials may still be valid if organizations didn’t rotate them
- Network topology reveals internal architecture
- Firewall rules show what services are exposed
- VPN configurations reveal remote access points
- Configuration files contain encryption keys and certificates
Geographic Distribution: Global exposure across healthcare, government, education, and enterprise sectors.
Industry Comparisons: Fortinet vs. Other Vendors
CISA KEV Appearances (Firewall/VPN Vendors):
- Ivanti: 16 CVEs (since January 2024) - Worst performer
- Fortinet: 20 CVEs (since 2019) - Second worst by volume
- SonicWall: 14 CVEs (since late 2021) - Third
- Palo Alto Networks: Multiple critical CVEs, but fewer KEV entries
- Cisco: Targeted by Akira, but less frequent KEV appearances
Fortinet’s Distinction: While not the highest count, Fortinet has seen some of the fastest exploit development and most widespread campaigns. The CVE-2024-55591 campaign affected organizations globally within weeks of disclosure.
The Healthcare Crisis: Why Fortinet Matters
Fortinet’s Market Position in Healthcare
Fortinet is deployed extensively in healthcare environments because:
- Cost-effective compared to enterprise alternatives
- Integrated security platform (SIEM, firewall, WAF, email security)
- Compliance features for HIPAA and other regulations
- Telemedicine support during COVID-19 accelerated adoption
The Problem: These same cost and integration benefits mean that when Fortinet devices are compromised, attackers gain a foothold in the entire security infrastructure.
Case Study: The Qilin-Synnovis Attack
The June 2024 Qilin ransomware attack on Synnovis demonstrates the real-world healthcare impact of Fortinet exploitation:
Attack Vector: FortiGate vulnerability exploitation (likely CVE-2024-21762 or CVE-2024-55591)
Impact:
- Pathology services for multiple major NHS hospitals in London disrupted
- Over 10,000 appointments and procedures canceled (not the initially reported 700-800)
- Blood transfusion services affected across London hospitals
- Manual workarounds required for weeks
- Patient safety incidents documented
- 3TB of sensitive data including patient records compromised
Financial Damage: Estimated millions in lost revenue, response costs, and patient care impacts
Regulatory Consequences: ICO investigation, potential GDPR fines, NHS contract review
Long-term Impact: The attack continued to reverberate through 2025, with the NHS identifying it as one of the most significant cyber incidents affecting UK healthcare infrastructure.
For comprehensive coverage of the UK healthcare cyber crisis, including the Synnovis aftermath, see: UK Cyber Security Crisis 2025: The Year of Retail Ransomware and Healthcare Havoc.
The Cascade Effect: Why One Fortinet Breach Affects Dozens of Hospitals
Healthcare operates as an interconnected ecosystem. When a vendor, pathology lab, pharmacy benefit manager, or other service provider is breached via Fortinet exploitation, the damage cascades:
Example Cascade:
- Pathology lab compromised via FortiGate vulnerability
- Attacker gains access to lab’s connections with 50+ hospitals
- Lateral movement to hospital networks through trusted relationships
- Exfiltration of patient records from multiple facilities
- Encryption or extortion affecting dozens of organizations simultaneously
This is exactly what happened in the Change Healthcare breach—one compromise affected healthcare delivery nationwide.
The Delayed Disclosure Problem: Why Silent Patching Hurts Healthcare
Fortinet’s handling of CVE-2025-64446 highlights a critical issue: delayed public disclosure after silent patching.
The Timeline That Failed Defenders
October 6, 2025: Security researchers at Defused detect FortiWeb vulnerability being exploited October 28, 2025: Fortinet releases patch in FortiWeb 8.0.2 October 28-November 14: 17-day silence—No CVE assigned, no public advisory, no customer notification November 14, 2025: Fortinet finally discloses CVE-2025-64446 and confirms exploitation November 14, 2025: CISA adds to KEV with 7-day remediation deadline
Why This Approach Fails
The Healthcare Patch Problem:
- Hospitals can’t patch what they don’t know exists
- Change management requires testing, scheduling, board approval
- Healthcare organizations follow strict change control (IT changes can disrupt patient care)
- Many waited for “routine maintenance windows” not knowing the severity
The Defender Disadvantage: Security researcher Ryan Emmons explained: “Many organizations, following standard change-control processes, understandably delayed patching. Meanwhile, it’s possible that Fortinet itself was unaware of the full severity of the issue and silently patched a flaw without realizing the risk it posed.”
The Result: Attackers had a 6-week head start (early October to mid-November) exploiting a vulnerability defenders didn’t know existed.
Industry Criticism
Researchers and CISOs have been scathing about Fortinet’s disclosure practices:
- No CVE assignment for 17 days delayed industry awareness
- No indicators of compromise provided, making detection nearly impossible
- Release notes for FortiWeb 8.0.2 contained no vulnerability references
- Security community couldn’t coordinate defenses without public information
- GreyNoise and other threat intelligence firms were tracking suspicious activity but couldn’t attribute it
As one researcher put it: “Obscurity hurts defenders more than it impedes attackers.”
The GreyNoise Warning: Predictive Traffic Spikes
GreyNoise, a threat intelligence firm that monitors internet scanning activity, issued a stark warning in late 2025: they detected a surge in malicious traffic targeting Fortinet devices, specifically focusing on FortiSIEM management interfaces.
The Historical Pattern:
- 80% of previous similar traffic spikes were followed by CVE disclosures within six weeks
- GreyNoise had observed this pattern repeatedly with Fortinet products
- The spikes indicate attackers are reconnaissance for vulnerable devices before public disclosure
CVE-2025-25256 (FortiSIEM - OS Command Injection):
- CVSS: 9.8 (Critical)
- Affected: FortiSIEM versions 5.4 through 7.3.1
- Impact: Unauthenticated remote code execution
- Discovery: “Practical exploit code found in the wild”
- No distinctive IoCs: Makes detection nearly impossible
The Shift in Attacker Behavior: GreyNoise noted that instead of targeting individual SSL VPN endpoints, attackers are now focusing on centralized management infrastructure to gain access to multiple FortiGate devices simultaneously.
Translation: Compromise one FortiManager, control dozens or hundreds of firewalls.
The Federal Response: CISA’s Aggressive Stance
CISA has taken an increasingly aggressive stance on Fortinet vulnerabilities, issuing some of the shortest remediation deadlines in KEV catalog history.
Notable CISA Actions:
CVE-2024-55591: 7-day deadline (January 2025)
- One of the shortest federal deadlines ever issued
- Indicated CISA’s high confidence in active, widespread exploitation
- Federal agencies scrambled to meet deadline
CVE-2025-64446: 7-day deadline (November 2025)
- Issued immediately upon disclosure
- CISA aware of exploitation since early October
- Hospitals and critical infrastructure urged to treat as emergency
BOD 23-02 Invocation: CISA specifically called out internet-exposed management interfaces as creating unacceptable risk, directly targeting Fortinet deployment patterns.
What Federal Deadlines Mean for Healthcare
When CISA issues 7-day deadlines, it’s signaling to the broader cybersecurity community: this is being actively exploited at scale and you need to act immediately.
For healthcare organizations, this creates a dilemma:
- Patch immediately and risk disrupting patient care if something breaks
- Wait for testing and risk ransomware attack encrypting all systems
Many hospitals have chosen door #2, with catastrophic results.
The CISA Quote That Says It All
In multiple advisories related to Fortinet vulnerabilities, CISA included this stark warning:
“This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.” Translation: Fortinet vulnerabilities are being actively, repeatedly weaponized by ransomware groups and nation-states.
What Healthcare Organizations Must Do Now
Immediate Actions (This Week)
Emergency Patch Assessment
- Identify all Fortinet devices in your environment (FortiGate, FortiWeb, FortiMail, FortiProxy, FortiSIEM, etc.)
- Cross-reference against CISA KEV catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Prioritize: CVE-2025-64446, CVE-2025-58034, CVE-2024-55591, CVE-2025-24472, CVE-2025-32756
Immediate Remediation
- Apply all available patches from Fortinet PSIRT advisories
- Critical: Even if patched, rotate all administrative credentials
- Disable internet-facing management interfaces
- Implement geo-IP restrictions on VPN access
Compromise Assessment
- Search logs for IOCs related to known Fortinet exploits
- Check for unauthorized administrative accounts
- Review firewall configuration changes in past 6 months
- Engage forensics team if any suspicious activity found
Short-Term Actions (This Month)
Vendor Risk Reassessment
- Evaluate whether Fortinet’s disclosure practices meet your risk tolerance
- Compare incident response between Fortinet vs. alternatives
- Consider migration timeline if risk is unacceptable
Defense in Depth
- Deploy EDR/XDR solutions on all endpoints
- Implement network segmentation (don’t rely solely on firewall)
- Deploy deception technology (honeypots) to detect lateral movement
- Enable MFA everywhere, especially VPN and administrative access
Backup Verification
- Ensure offline, immutable backups of all critical systems
- Test restoration procedures (ransomware assumes you can’t restore)
- Store backups off-network and offsite
Long-Term Strategy
Zero Trust Architecture
- Assume your perimeter is already compromised
- Implement continuous verification of all users and devices
- Micro-segmentation to limit lateral movement
- Eliminate implicit trust between systems
Threat Intelligence Integration
- Subscribe to feeds like GreyNoise, Shodan, Censys
- Monitor for scanning activity targeting your devices
- Join healthcare ISACs for sector-specific intelligence
Board-Level Reporting
- Present Fortinet risk profile to board and executive leadership
- Quantify potential impact (patient care disruption, regulatory fines)
- Request budget for remediation or migration
Regulatory Compliance
- Update HIPAA risk assessments to reflect Fortinet vulnerabilities
- Document remediation efforts for OCR audits
- Prepare breach notification procedures
The Uncomfortable Questions Leadership Must Answer
- When a firewall vendor has 20 CVEs on CISA’s Known Exploited Vulnerabilities catalog, at what point does continuing to use their products become negligent?
- If Fortinet takes 17 days to publicly disclose an actively exploited zero-day, how can we rely on them to protect patient data?
- When healthcare ransomware attacks have impacted 259 million Americans in a single year, mostly through unpatched vulnerabilities, why are we still falling behind on patching?
- If 42% of healthcare organizations cite “lack of people and capacity” as a security failure contributor, why aren’t boards investing in cybersecurity staff?
- When a single Fortinet compromise can cascade to affect dozens of hospitals through trusted vendor relationships, why are we still treating vendor risk as a checkbox exercise?
These aren’t rhetorical questions—they’re the questions regulatory bodies, plaintiff attorneys, and congressional committees will ask after the next major healthcare breach.
Lessons from the SonicWall Comparison
In our recent analysis of the Marquis Software breach (which exposed 788,000 bank customers through SonicWall exploitation), we documented SonicWall’s 14 CVEs on CISA KEV and ongoing targeting by Akira ransomware.
The Parallel is Clear:
- Both vendors have 14-20 CVEs on CISA KEV
- Both are repeatedly exploited by the same ransomware groups (Akira, Qilin, LockBit variants)
- Both suffer from post-patch persistence techniques
- Both have customers who remain unpatched for months after disclosure
- Both have delayed disclosure issues
The Difference:
- SonicWall primarily impacts financial services and SMBs
- Fortinet breaches are devastating healthcare and critical infrastructure
The human cost of Fortinet exploitation—canceled surgeries, delayed cancer treatments, disrupted pathology services—is immeasurably higher.
Conclusion: Healthcare Cannot Afford Business as Usual
The evidence is overwhelming: Fortinet products are under sustained, sophisticated attack by the world’s most dangerous ransomware groups, and healthcare is bearing the brunt of the damage.
With 20 CVEs on CISA’s KEV catalog, active exploitation in ongoing campaigns, delayed disclosure practices, and 444 healthcare incidents in 2024 alone affecting 259 million Americans, the status quo is untenable.
Healthcare CISOs and boards face a critical decision:
- Accept the risk of continuing with Fortinet, implementing defense-in-depth, and maintaining aggressive patching
- Migrate away to vendors with better security track records and disclosure practices
- Hybrid approach: Keep Fortinet where acceptable, but eliminate internet-facing management interfaces and segment critical assets
What’s not acceptable is doing nothing.
The next Synnovis, Change Healthcare, or Ascension breach is not a question of “if”—it’s “when” and “which hospital system.”
Every day of delay in addressing known Fortinet vulnerabilities is a day attackers have to refine their techniques, scan for victims, and prepare their next campaign.
For healthcare organizations responsible for patient safety, the time to act is now—not after the ransomware has already encrypted your systems and stolen your patients’ medical records.
See Also: Related Coverage
Ransomware-as-a-Service Ecosystem & Major Groups:
- The Ransomware-as-a-Service Ecosystem in Late 2025: From LockBit’s Disruption to the Rise of Qilin, Akira, and DragonForce - Comprehensive analysis of how Qilin became #1 after LockBit takedown
- Habib Bank AG Zurich Hit by Qilin Ransomware: 2.5TB of Sensitive Data Stolen - Qilin’s financial sector targeting and victim list
- Ransomware Onslaught: Multiple Groups Post Fresh Victims on October 3, 2025 - Coordinated disclosure day showing Akira, Qilin, SpaceBears campaigns
- The Ransomware Revolution: How Attack Economics Are Reshaping the Threat Landscape Entering 2026 - 34% surge in attacks, payment trends
Healthcare Ransomware Crisis:
- UK Cyber Security Crisis 2025: The Year of Retail Ransomware and Healthcare Havoc - Synnovis aftermath, NHS Dumfries attack, UK healthcare vulnerabilities
- Threat Intelligence Report: Summer 2025 Cyber Threat Landscape - Qilin’s healthcare targeting, Synnovis case study
- August 2025: A Month of Unprecedented Cyber Attacks and Data Breaches - Multiple Qilin healthcare attacks
- 10 Latest Global Cybersecurity Breaches: Healthcare Edition (2025) - Frederick Health, Blue Shield, major healthcare breaches
Parallel Firewall Exploitation Analysis:
- Marquis Ransomware Breach: SonicWall’s Vulnerability History - Sister article analyzing SonicWall’s 14 CVEs on CISA KEV
- The KNP Logistics Ransomware Attack - Real-world impact of basic security failures
2025 Threat Landscape & Trends:
- The Cybersecurity Battleground: September 2025’s Most Critical Threats - Qilin’s precision targeting evolution
- This Week in Breaches: Education, Finance, and the Cloud Under Fire - Western Alliance Bank (Cl0p), ongoing campaigns
External Healthcare & Fortinet Resources:
- Report: Healthcare Had Most Reported Cyberthreats in 2024 - AHA analysis of 444 incidents
- How Healthcare Ransomware Attacks Are Shifting in 2025 - Data extortion overtakes encryption
- Critical Fortinet Flaws Now Exploited in Qilin Ransomware Attacks - Technical analysis
- Data From 15,000 Fortinet Firewalls Leaked by Hackers - Belsen Group leak
CISA Resources:
- Known Exploited Vulnerabilities Catalog - Search for Fortinet’s 20 CVEs
- Fortinet FortiWeb Advisory - CVE-2025-64446 details
Analysis conducted December 2025. Information compiled from CISA advisories, healthcare sector reports, security vendor research, and threat intelligence. Healthcare organizations should consult with legal counsel and security professionals regarding remediation strategies and regulatory compliance.



