Tools: 22 Fortinet Patches, 2 Ivanti Auth Bypasses, 9 Intel UEFI Bugs — Your March 2026 Patching Cheat Sheet
The Fortinet Patch Dump: What Actually Matters
CVE-2026-22153: The Auth Bypass You Need to Fix Today
CVE-2025-25249: Heap Overflow → Remote Code Execution
Ivanti: Two More Auth Problems
Your Prioritized Patching Plan
Priority 1: FortiOS 7.6.x (CVE-2026-22153) — This Week
Priority 2: FortiOS/FortiSwitchManager (CVE-2025-25249) — Within 2 Weeks
Priority 3: FortiClientLinux (CVE-2026-24018) — Next Maintenance Window
Priority 4: Ivanti EPM (CVE-2026-1603) — Within 2 Weeks
Priority 5: Intel UEFI Firmware — Next Quarterly Window
Why Does Fortinet Keep Having Auth Bypasses?
Post-Patch: Check for Pre-Patch Exploitation
The Bigger March 2026 Picture Fortinet dropped 22 security patches on March 11, 2026, including a FortiOS authentication bypass (CVE-2026-22153) that lets unauthenticated attackers slip past LDAP-based VPN and FSSO policies. The same patch cycle addresses a heap buffer overflow (CVE-2025-25249) in FortiOS and FortiSwitchManager enabling remote code execution. Ivanti simultaneously patched a high-severity auth bypass in Endpoint Manager. If you manage FortiGate firewalls, Ivanti EPM, or Intel-based infrastructure, here's your prioritized action plan. TL;DR: FortiOS 7.6.0–7.6.4 has an auth bypass that grants unauthorized network access without credentials. Patch to 7.6.5+ immediately if you use Agentless VPN or FSSO with LDAP. Fortinet released fixes for 22 security defects across its portfolio. Here's the breakdown of what you need to care about: None are currently exploited in the wild. But Fortinet's track record says exploitation follows disclosure by days, not weeks. CVE-2026-24858 — a related FortiOS SSO auth bypass — was actively exploited in January 2026 with attackers creating rogue admin accounts before patches even shipped. This is a CWE-288 authentication bypass in FortiOS that lets an unauthenticated attacker bypass LDAP authentication for Agentless VPN or FSSO policies. Successful exploitation grants unauthorized access to network resources without valid credentials. The catch: it requires a specific LDAP server configuration. But Agentless VPN and FSSO are exactly the features that enterprise networks deploy at scale. If your FortiGate authenticates remote users or maps AD users to firewall policies via FSSO, you're in the blast radius. Affected: FortiOS 7.6.0 through 7.6.4
Fix: Update to FortiOS 7.6.5+ A heap-based buffer overflow (CWE-122) in the cw_acd daemon of FortiOS and FortiSwitchManager. Remote unauthenticated attackers can execute arbitrary code via crafted requests. The version spread is brutal: That covers essentially every FortiOS release train still in production. Ivanti released patches in Endpoint Manager 2024 SU5: CVE-2026-1603 is the bigger concern — an auth bypass that exposes credential data remotely. Given Ivanti's history (CVE-2025-22457 in Connect Secure was a zero-day RCE exploited before the patch), don't sit on this one. Based on severity, exploitability, and typical network exposure: If you run Agentless VPN or FSSO with LDAP authentication, this is job #1. The heap overflow affects nearly all FortiOS versions. Attack complexity is high, but impact is full RCE. Schedule alongside your CVE-2026-22153 patching. Local privesc to root via symlink following. If you deploy FortiClient on Linux endpoints, queue it up. Update to EPM 2024 SU5. Auth bypass + credential exposure = potential cascade. Intel published advisory INTEL-SA-01234 with nine UEFI vulnerabilities across 45+ processor models. Five rated high severity. Requires local access, so lower urgency — but UEFI compromises persist across OS reinstalls. This is the pattern that should concern you: multiple authentication bypass vulnerabilities within Q1 2026 alone. CVE-2026-24858 was actively exploited as a zero-day in January: Now CVE-2026-22153 arrives — another auth bypass, same vulnerability class (CWE-288). This suggests a systemic issue in how FortiOS handles authentication flows. If Fortinet is your primary perimeter defense: Even after patching, verify these weren't exploited before your update window: For CVE-2026-22153 (LDAP bypass): For CVE-2025-25249 (heap overflow): For Ivanti EPM (CVE-2026-1603): This wasn't just Fortinet and Ivanti. March 2026 was one of the heaviest patch loads of the year: If you haven't built an automated patch validation pipeline (test → staging → production), March 2026 is your wake-up call. Disclosure: This article was adapted from original research with AI assistance in editing and formatting. Templates let you quickly answer FAQs or store snippets for re-use. Hide child comments as well For further actions, you may consider blocking this person and/or reporting abuse