Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21743: Improper access control in Fortinet FortiAuthenticator

0
Medium
VulnerabilityCVE-2026-21743cvecve-2026-21743
Published: Tue Feb 10 2026 (02/10/2026, 15:39:11 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiAuthenticator

Description

A missing authorization vulnerability in Fortinet FortiAuthenticator 6.6.0 through 6.6.6, FortiAuthenticator 6.5 all versions, FortiAuthenticator 6.4 all versions, FortiAuthenticator 6.3 all versions may allow a read-only user to make modification to local users via a file upload to an unprotected endpoint.

AI-Powered Analysis

AILast updated: 02/18/2026, 09:46:43 UTC

Technical Analysis

CVE-2026-21743 is a security vulnerability identified in Fortinet FortiAuthenticator versions 6.3.0 through 6.6.6. The flaw stems from improper access control where a user with read-only privileges can exploit an unprotected file upload endpoint to modify local user accounts. Normally, read-only users should not have permissions to alter user data; however, due to missing authorization checks, these users can upload crafted files that change authentication configurations or user credentials. This vulnerability affects multiple major versions of FortiAuthenticator, a widely deployed authentication management product used to centralize user authentication and identity management. The vulnerability is remotely exploitable over the network without requiring user interaction but does require the attacker to have read-only authenticated access. The CVSS 3.1 base score is 6.8, reflecting medium severity with high impact on confidentiality, integrity, and availability. The exploitability is rated as low complexity with partial remediation level and confirmed report status. No public exploits or active exploitation have been reported to date. The vulnerability could allow attackers to escalate privileges, create or modify user accounts, and potentially gain unauthorized administrative access, undermining the security of authentication infrastructure.

Potential Impact

For European organizations, this vulnerability poses significant risks to identity and access management systems. Compromise of FortiAuthenticator could lead to unauthorized access to critical systems, data breaches, and disruption of authentication services. This is particularly impactful for sectors relying heavily on strong authentication controls such as finance, healthcare, government, and critical infrastructure. Attackers exploiting this flaw could manipulate user accounts, potentially bypassing multi-factor authentication or gaining persistent access. The integrity of user credentials and authentication policies could be compromised, leading to lateral movement within networks. Availability of authentication services could also be affected if attackers disrupt or corrupt user data. Given Fortinet's strong presence in Europe, the vulnerability could affect a broad range of organizations, increasing the risk of targeted attacks or insider threats leveraging this flaw.

Mitigation Recommendations

1. Immediately upgrade FortiAuthenticator to the latest patched version once available from Fortinet. 2. Restrict network access to FortiAuthenticator management interfaces to trusted administrative networks only, using network segmentation and firewall rules. 3. Enforce strict role-based access controls (RBAC) to limit read-only user privileges and monitor for any privilege escalations. 4. Implement robust logging and continuous monitoring for unusual file upload activities or configuration changes on FortiAuthenticator devices. 5. Conduct regular audits of user accounts and authentication policies to detect unauthorized modifications. 6. Use multi-factor authentication for all administrative and privileged access to FortiAuthenticator. 7. Educate administrators about this vulnerability and ensure rapid incident response capabilities are in place. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting the vulnerable endpoint. 9. If immediate patching is not possible, disable or restrict access to the vulnerable file upload endpoint if feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2026-01-05T14:17:53.224Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b5d5f4b57a58fa119cfbf

Added to database: 2/10/2026, 4:31:27 PM

Last enriched: 2/18/2026, 9:46:43 AM

Last updated: 2/21/2026, 12:16:53 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats