Published: Wed 28 January 2026
Prepared by: Adam Skupien, Vulnerability Security Analyst
Fortinet has disclosed a Critical authentication bypass vulnerability impacting FortiOS, FortiManager, FortiAnalyzer, and FortiProxy, tracked as CVE-2026-24858 (CVSS 9.4), after observation of active exploitation targeting FortiCloud SSO administrative logins.
CISA has added CVE-2026-24858 to the Known Exploited Vulnerabilities (KEV) catalog on 27 Jan 2026 with a remediation due date of 30 Jan 2026.
Vendor patches are still being finalised; in the interim, Fortinet has deployed FortiCloud-side controls that prevent vulnerable versions from authenticating via FortiCloud SSO.
CVE-2026-24858 is an authentication bypass via an alternate path/channel (CWE-288) affecting Fortinet’s FortiCloud SSO administrative login. In practical terms, if FortiCloud SSO admin login is enabled on a device, an attacker who already has their own FortiCloud account and a registered device may be able to authenticate to other customers’ devices registered to different FortiCloud accounts.
This activity is closely related to the December 2025 FortiCloud SSO vulnerabilities (CVE-2025-59718 and CVE-2025-59719) because it targets the same overall surface: administrative authentication via FortiCloud SSO / SAML SSO. However, Fortinet and third-party tracking describe CVE-2026-24858 as a new issue rather than a patch bypass, and it has reportedly been used against environments believed to be fully patched for the December 2025 CVEs. Mechanically, the earlier vulnerabilities were described as unauthenticated crafted SAML / signature verification flaws, whereas CVE-2026-24858 hinges on attacker-controlled FortiCloud identity and device registration, and appears to enable cross-tenant authentication when FortiCloud SSO is enabled.
FortiCloud SSO admin login is not enabled by default, but it can be inadvertently switched on during FortiCare registration from the device GUI unless administrators explicitly disable the “Allow administrative login using FortiCloud SSO” toggle. As part of its response, Fortinet has also blocked FortiCloud SSO admin logins from vulnerable (unpatched) versions on the FortiCloud side. Fortinet’s investigation is also still evolving, with FortiWeb and FortiSwitch Manager noted as products under investigation for potential impact.
Affected products / versions
Fortinet’s FG-IR-26-060 advisory lists the following products and versions as potentially vulnerable:
|
Version |
Affected |
Solution |
|
FortiAnalyzer 7.6 |
7.6.0 through 7.6.5 |
Upgrade to upcoming 7.6.6 or above |
|
FortiAnalyzer 7.4 |
7.4.0 through 7.4.9 |
Upgrade to upcoming 7.4.10 or above |
|
FortiAnalyzer 7.2 |
7.2.0 through 7.2.11 |
Upgrade to upcoming 7.2.12 or above |
|
FortiAnalyzer 7.0 |
7.0.0 through 7.0.15 |
Upgrade to upcoming 7.0.16 or above |
|
FortiAnalyzer 6.4 |
Not affected |
Not Applicable |
|
FortiManager 7.6 |
7.6.0 through 7.6.5 |
Upgrade to upcoming 7.6.6 or above |
|
FortiManager 7.4 |
7.4.0 through 7.4.9 |
Upgrade to upcoming 7.4.10 or above |
|
FortiManager 7.2 |
7.2.0 through 7.2.11 |
Upgrade to upcoming 7.2.13 or above |
|
FortiManager 7.0 |
7.0.0 through 7.0.15 |
Upgrade to upcoming 7.0.16 or above |
|
FortiManager 6.4 |
Not affected |
Not Applicable |
|
FortiOS 7.6 |
7.6.0 through 7.6.5 |
Upgrade to upcoming 7.6.6 or above |
|
FortiOS 7.4 |
7.4.0 through 7.4.10 |
Upgrade to upcoming 7.4.11 or above |
|
FortiOS 7.2 |
7.2.0 through 7.2.12 |
Upgrade to upcoming 7.2.13 or above |
|
FortiOS 7.0 |
7.0.0 through 7.0.18 |
Upgrade to upcoming 7.0.19 or above |
|
FortiOS 6.4 |
Not affected |
Not Applicable |
|
FortiProxy 7.6 |
7.6.0 through 7.6.4 |
Upgrade to upcoming 7.6.6 or above |
|
FortiProxy 7.4 |
7.4.0 through 7.4.12 |
Upgrade to upcoming 7.4.13 or above |
|
FortiProxy 7.2 |
7.2 all versions |
Migrate to a fixed release |
|
FortiProxy 7.0 |
7.0 all versions |
Migrate to a fixed release |
Successful exploitation of CVE-2026-24858 may allow an attacker with a FortiCloud account and a registered device to bypass administrative FortiCloud SSO authentication on affected Fortinet products where FortiCloud SSO admin login is enabled. This can result in administrative access to targeted devices, including those registered to other FortiCloud accounts, and may lead to:
Unlike the December 2025 FortiCloud SSO vulnerabilities, Fortinet has confirmed active exploitation in the wild for this issue, with observed attacker activity including configuration download and local admin account creation. Fortinet’s investigation remains ongoing and further details (including additional affected products and indicators) may be published as the situation develops.
Apply vendor remediation (priority)
FortiCloud SSO controls (risk reduction)
Disable via GUI:
System → Settings → Allow administrative login using FortiCloud SSO → Off
Disable via CLI:
config system global
set admin-forticloud-sso-login disable
end
Harden management access
Logging & telemetry
Ensure Fortinet device logs (FortiOS/FortiProxy/FortiManager/FortiAnalyzer), authentication logs, and (where applicable) Identity Provider / SAML logs are forwarded to a SIEM or central monitoring platform. Focus on retaining:
Indicators of compromise (IOCs)
Known FortiCloud SSO login user accounts (observed)
Note: Fortinet also notes these addresses may change over time. Treat them as “known bad,” not exhaustive, and continue hunting for unexpected FortiCloud SSO admin logins and follow-on activity.
Observed source IP addresses (Fortinet)
Additional IPs observed by third parties (not Fortinet)
Suspicious local admin account names observed (post-SSO login)
Hunt guide (recommended queries / patterns)
Review FortiCloud SSO / SAML SSO admin logins for anomalies (new/unusual source IPs, odd times, atypical accounts) and any immediate privileged actions afterwards.
Alert on known-bad SSO accounts (cloud-noc@mail.io, cloud-init@mail.io) and treat any hits as a rapid triage trigger (review source IP + follow-on changes).
Look for the common attack chain: SSO admin login → config access/export → new local admin created.
Monitor for persistence and tampering: unexpected admin accounts, privilege escalations/resets, and high-risk configuration changes (SSO/auth settings, management exposure, VPN, logging).
Use reported IPs as pivots, not proof: an IP hit is a lead—confirm it lines up with SSO admin login + follow-on actions, as IPs may be Cloudflare-fronted/rotating.
If compromise is suspected
MDR customers: Triskele Labs is actively tuning detections for behaviour consistent with exploitation of CVE-2026-24858 and related Fortinet authentication bypass activity across supported log sources.
Vulnerability Management customers: Environments are being assessed for vulnerable Fortinet versions; any exposure will be communicated through priority channels.