Skip to content
Threat Feed
high advisory

First-Time FortiGate Administrator Login Detected

A user with the Administrator role has successfully logged in to the FortiGate management interface for the first time within the last 5 days, potentially indicating unauthorized access or misconfiguration.

This detection rule identifies the initial successful login of a user account with the “Administrator” role to a Fortinet FortiGate firewall management interface. The rule analyzes FortiGate logs over a 5-day window to identify previously unseen administrator logins. This activity may indicate several potential security concerns, including newly provisioned and potentially rogue accounts, misconfigurations granting elevated privileges, or unauthorized access via compromised credentials. This detection is crucial for organizations relying on FortiGate appliances for network security, as unauthorized administrative access could lead to significant configuration changes, policy violations, and overall network compromise. CISA released guidance on January 28, 2026, concerning exploitation of authentication bypass vulnerabilities in Fortinet products, highlighting the need for vigilance.

Attack Chain

  1. The attacker gains initial access, possibly through credential compromise or exploiting an authentication bypass vulnerability.
  2. The attacker uses valid credentials (or bypasses authentication) to access the FortiGate management interface.
  3. The FortiGate logs the successful login event with the Administrator role assigned to the user.
  4. The detection rule identifies this login as the first observed for that user within the specified timeframe.
  5. The attacker may then modify firewall policies to allow malicious traffic.
  6. The attacker could create new user accounts with elevated privileges for persistence.
  7. Configuration data may be exfiltrated for further reconnaissance.
  8. The attacker achieves complete control over the FortiGate device and potentially the entire network.

Impact

Successful exploitation can lead to full control over the FortiGate device and the network it protects. An attacker with administrative access can modify firewall policies, create backdoors, exfiltrate sensitive data, and disrupt network operations. The rule identifies potentially malicious administrative logins, allowing administrators to promptly validate and respond to any suspicious activity.

Recommendation

  • Deploy the Sigma rule Fortigate First Time Admin Login to your SIEM and tune for your environment.
  • Investigate any alerts generated by the Fortigate First Time Admin Login rule, focusing on the source IP (source.ip) and the FortiGate Admin Profile the identity logged in under (fortinet.firewall.profile).
  • Review the Fortinet documentation for guidance on securing FortiGate appliances: https://www.elastic.co/docs/reference/integrations/fortinet_fortigate.
  • Monitor FortiGate logs for unusual activity, especially related to administrative access and configuration changes.

Detection coverage 2

Fortigate First Time Admin Login

high

Detects the first-time login of a Fortigate administrator

sigma tactics: initial_access techniques: T1078 sources: firewall, fortinet

Fortigate Administrator Login from New Source IP

medium

Detects a Fortigate administrator login from a previously unseen source IP address.

sigma tactics: initial_access techniques: T1078 sources: firewall, fortinet

Detection queries are available on the platform. Get full rules →