Yotam Gutman

07/05/2026

Fortinet SSL-VPN Support Ends May 11. Here Is What Each Migration Path Does to Your Attack Surface.

Fortinet SSL-VPN End of Engineering Support lands May 11. No more security patches. Here are the three migration paths and the one question you should ask before you pick one.

Fortinet SSL-VPN reaches End of Engineering Support on May 11, 2026. That date has a specific meaning: after May 11, Fortinet will no longer release security patches for SSL-VPN. Existing vulnerabilities that are not yet patched will stay unpatched. New vulnerabilities discovered after that date will not be fixed.

This is not a soft deprecation. It is a hard cutoff.

If you are still running Fortinet SSL-VPN in production, you have four days to either complete a migration or make a deliberate decision to run unpatched SSL-VPN indefinitely. The second option means accepting every CVE discovered after May 11 as a permanent risk with no vendor fix coming.

Where the Fortinet SSL-VPN attack surface stands today

The timing matters because Fortinet SSL-VPN is already an active target. CISA's Known Exploited Vulnerabilities catalog includes multiple Fortinet SSL-VPN flaws, and credential-based attacks on VPN gateways have become routine: according to Verizon's 2025 Data Breach Investigations Report, 54% of ransomware attacks that year were traced back to infostealer-enabled credential theft. Attackers do not need a zero-day. They need credentials and an open IP path. Fortinet SSL-VPN gives them both.

After May 11, any new vulnerability discovered in SSL-VPN joins a list that Fortinet will not address. The attack surface grows. The patch queue does not. The exposure is not hypothetical: in the same month Fortinet SSL-VPN support ended, Palo Alto Networks disclosed CVE-2026-0300, a pre-auth root RCE in PAN-OS with no patch available for four days. The pattern it represents runs across the entire category.

The three migration paths

Organizations in active migration conversations are generally looking at three options. The question worth asking about each one is not whether it solves the immediate compliance problem. The question is whether the migration eliminates the attack class or relocates it.

Path 1: Upgrade within the Fortinet ecosystem

The most common path is upgrading from SSL-VPN to FortiGate IPsec VPN, or adopting FortiClient ZTNA within the Fortinet Security Fabric. This solves the EoEng problem. SSL-VPN is replaced by a supported product.

What it does not solve: the fundamental architecture remains the same. IPsec VPN and FortiClient ZTNA are both IP-based, credential-authenticated access products. An attacker with valid credentials can still log in. An attacker who compromises the VPN gateway or the ZTNA agent still has a path into the network. The attack class, IP-based authenticated access, is not eliminated. It is moved to a different product in the same family.

There is a third path that eliminates the attack class rather than relocating it. Explore the Zeroport Fantom appliance or book a demo to see how it works.

Path 2: Move to a ZTNA software platform

The second path is replacing Fortinet SSL-VPN with a third-party ZTNA platform. ZTNA reduces the attack surface relative to traditional VPN by applying granular identity and device controls before granting access to applications rather than the full network.

What it does not solve: ZTNA is still software. It still routes traffic over IP. It still relies on credential-based authentication. Session tokens are still issued and can still be stolen. Infostealers that extract live session tokens bypass MFA by design. Cloudflare's 2026 threat analysis found that 46% of human login attempts across its network use credentials already compromised in prior breaches. A compromised ZTNA session still carries authorized access. The attack class is narrowed but not eliminated.

Path 3: Move to hardware-enforced access

The third path is the only one that eliminates the attack class. Hardware-enforced remote access, built on architectures that convert the session to analog signals at the organization's network edge, means that no packet ever enters the protected network. There is no IP path for lateral movement. There is no session token that carries network access. Stolen credentials allow an attacker to see pixels and move a cursor. They do not allow code execution, data exfiltration through the access channel, or lateral movement into the network.

The trade-off is real: hardware-enforced access is a larger architectural change than an in-ecosystem upgrade. It requires deploying a physical device at the network edge. For organizations managing highly sensitive environments, operational technology, or critical infrastructure, that architectural change is the point. For environments where the primary concern is getting off SSL-VPN by May 11, paths one or two may be the faster route.

The question to ask

Before the May 11 deadline, the question worth asking is not only "which path gets us off SSL-VPN?" It is "does this migration eliminate the attack class that SSL-VPN represented, or does it move that class of risk to a different product?"

The credential-theft pattern documented by Verizon and Cloudflare required no vulnerability. It required valid credentials and an IP path. Both of those remain in place under paths one and two. Under path three, neither exists.

What you migrate to determines what you remain exposed to.

Book a Demo to see how Zeroport removes the attack class entirely

Secure Access
at Every Level

Empower global teams with secure, hardware-enforced remote access, no VPNs, no data exposure, no risk.

More info