Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22572: Improper access control in Fortinet FortiManager

0
Medium
VulnerabilityCVE-2026-22572cvecve-2026-22572
Published: Tue Mar 10 2026 (03/10/2026, 16:44:16 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiManager

Description

An authentication bypass using an alternate path or channel vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2.2 through 7.2.11, FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.2 through 7.2.11 may allow an attacker with knowledge of the admins password to bypass multifactor authentication checks via submitting multiple crafted requests.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 18:44:10 UTC

Technical Analysis

CVE-2026-22572 is a vulnerability in Fortinet's FortiManager and FortiAnalyzer products, specifically versions 7.2.2 through 7.6.3. The flaw is an improper access control issue that allows an attacker who already possesses the administrator's password to bypass multifactor authentication (MFA) mechanisms. This bypass is achieved by exploiting an alternate path or channel through submitting multiple crafted requests, effectively circumventing the intended MFA checks. The vulnerability affects both FortiManager and FortiAnalyzer, which are widely used for centralized network management and security event analysis respectively. The CVSS v3.1 score of 6.8 indicates a medium severity, with the vector showing network attack vector, low attack complexity, and requiring high privileges but no user interaction. The impact includes full compromise of confidentiality, integrity, and availability of the affected systems, as the attacker can gain administrative access without completing MFA. No public exploits have been reported yet, but the vulnerability is critical for organizations relying on these products for security management. The vulnerability was published on March 10, 2026, and affects multiple recent versions, highlighting the need for timely patching and mitigation.

Potential Impact

The vulnerability allows attackers with knowledge of admin credentials to bypass MFA, significantly increasing the risk of unauthorized administrative access. This can lead to full compromise of network management infrastructure, allowing attackers to alter configurations, disable security controls, exfiltrate sensitive data, or disrupt network operations. The confidentiality, integrity, and availability of the affected systems are all at risk. Organizations relying on FortiManager and FortiAnalyzer for centralized security management could face severe operational impacts, including potential lateral movement within networks and disruption of security monitoring capabilities. The medium CVSS score reflects the requirement for credential knowledge, but the bypass of MFA reduces the effectiveness of a critical security control, raising the overall risk posture. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant threat if exploited.

Mitigation Recommendations

Organizations should immediately verify if they are running affected versions of FortiManager or FortiAnalyzer (7.2.2 through 7.6.3) and apply any available patches or updates from Fortinet as soon as they are released. In the absence of patches, implement compensating controls such as restricting administrative access to trusted networks or VPNs, enforcing strict network segmentation, and monitoring for anomalous authentication attempts or multiple crafted requests indicative of exploitation attempts. Additionally, enforce strong password policies and consider rotating administrator credentials to reduce the risk posed by credential compromise. Enable detailed logging and alerting on authentication bypass attempts and review logs regularly. Employ additional layers of security such as endpoint detection and response (EDR) tools to detect lateral movement or unusual administrative activities. Finally, conduct security awareness training for administrators about the risks of credential compromise and the importance of MFA.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2026-01-07T18:30:44.882Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05634ea502d3aa87d6bc4

Added to database: 3/10/2026, 5:34:44 PM

Last enriched: 3/17/2026, 6:44:10 PM

Last updated: 4/28/2026, 5:39:44 AM

Views: 180

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses