Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24858: Improper access control in Fortinet FortiOS

0
Critical
VulnerabilityCVE-2026-24858cvecve-2026-24858
Published: Tue Jan 27 2026 (01/27/2026, 19:18:23 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:21:57 UTC

Technical Analysis

CVE-2026-24858 is an authentication bypass vulnerability classified under CWE-288, impacting a wide range of Fortinet products including FortiOS, FortiAnalyzer, FortiManager, FortiProxy, and FortiWeb across multiple versions (7.0.0 through 7.6.5 and related subversions). The vulnerability arises from improper access control in the FortiCloud Single Sign-On (SSO) authentication mechanism. Specifically, an attacker who has a valid FortiCloud account and a registered device can exploit an alternate authentication path to log into devices registered to other FortiCloud accounts without proper authorization. This bypass does not require any user interaction or prior privileges on the target device, making it highly exploitable remotely over the network. The vulnerability affects devices that have FortiCloud SSO enabled, a feature designed to simplify authentication across Fortinet devices by leveraging cloud-based identity management. The CVSS v3.1 score of 9.4 (critical) reflects the vulnerability's network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. While no public exploits have been reported yet, the flaw could allow attackers to gain unauthorized administrative access, potentially leading to full device compromise, manipulation of security policies, interception or redirection of network traffic, and disruption of network operations. Fortinet has published advisories and is expected to release patches to address this issue. Organizations should assess their deployment of Fortinet products with FortiCloud SSO enabled and apply updates promptly once available.

Potential Impact

The impact of CVE-2026-24858 is severe for organizations worldwide relying on Fortinet security infrastructure. Successful exploitation allows attackers to bypass authentication controls and gain unauthorized access to critical network security devices, including firewalls, proxies, web application firewalls, and management consoles. This can lead to full compromise of the affected devices, enabling attackers to alter firewall rules, disable security features, exfiltrate sensitive data, or launch further attacks within the network. The breach of confidentiality, integrity, and availability of network security controls can disrupt business operations, cause data breaches, and expose organizations to regulatory penalties. Given Fortinet's widespread adoption in enterprise, government, and service provider environments, the vulnerability poses a significant risk to critical infrastructure and sensitive networks globally. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing the likelihood of targeted attacks or automated compromise attempts once exploit code becomes available. Organizations with FortiCloud SSO enabled are particularly at risk, as the vulnerability specifically targets this authentication mechanism.

Mitigation Recommendations

To mitigate CVE-2026-24858, organizations should take the following specific actions: 1) Immediately inventory all Fortinet devices (FortiOS, FortiAnalyzer, FortiManager, FortiProxy, FortiWeb) to identify versions affected by this vulnerability and confirm if FortiCloud SSO authentication is enabled. 2) Apply vendor-supplied patches or updates as soon as they are released to remediate the vulnerability. 3) If patches are not yet available, consider temporarily disabling FortiCloud SSO authentication on all affected devices to prevent exploitation. 4) Implement strict network segmentation and access controls to limit management interface exposure to trusted networks and IP addresses only. 5) Enable multi-factor authentication (MFA) on FortiCloud accounts to reduce the risk of account compromise. 6) Monitor Fortinet device logs and FortiCloud account activity for unusual login attempts or access patterns. 7) Review and tighten Fortinet device administrative policies and credentials to minimize potential attack surface. 8) Educate security teams about this vulnerability and prepare incident response plans in case of exploitation. 9) Coordinate with Fortinet support for guidance and updates regarding patches and mitigation best practices. These targeted steps go beyond generic advice by focusing on the specific authentication mechanism and deployment scenarios involved.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2026-01-27T15:11:02.057Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979139d4623b1157c42d523

Added to database: 1/27/2026, 7:35:57 PM

Last enriched: 3/24/2026, 12:21:57 AM

Last updated: 3/26/2026, 4:42:09 AM

Views: 186

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses