CVE-2026-22572

7.2 HIGH

📋 TL;DR

This CVE describes an authentication bypass vulnerability in Fortinet FortiAnalyzer and FortiManager products (both on-premises and cloud versions). Attackers who know an admin password can bypass multi-factor authentication by sending multiple specially crafted requests. This affects multiple versions of these security management platforms.

💻 Affected Systems

Products:
  • FortiAnalyzer
  • FortiAnalyzer Cloud
  • FortiManager
  • FortiManager Cloud
Versions: FortiAnalyzer 7.6.0-7.6.3, 7.4.0-7.4.7, 7.2.2-7.2.11; FortiAnalyzer Cloud 7.6.0-7.6.3, 7.4.0-7.4.7, 7.2.2-7.2.10; FortiManager 7.6.0-7.6.3, 7.4.0-7.4.7, 7.2.2-7.2.11; FortiManager Cloud 7.6.0-7.6.3, 7.4.0-7.4.7, 7.2.2-7.2.10
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker knowledge of admin password; affects both on-premises and cloud versions; MFA must be configured for the vulnerability to be relevant.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with knowledge of admin credentials could gain full administrative access to FortiAnalyzer/FortiManager systems, potentially compromising the entire security management infrastructure and accessing sensitive log data.

🟠

Likely Case

Attackers with stolen or guessed admin credentials bypass MFA protections to gain unauthorized administrative access to security management systems.

🟢

If Mitigated

With proper MFA enforcement and credential protection, the attack surface is significantly reduced, though the vulnerability still exists in the software.

🌐 Internet-Facing: HIGH - These systems are often internet-facing for management, and attackers with credential knowledge can bypass MFA protections.
🏢 Internal Only: MEDIUM - Internal attackers with admin credential knowledge could still exploit this, but requires more privileged initial access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires knowledge of admin credentials and ability to send multiple crafted requests; no public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiAnalyzer/FortiManager 7.6.4, 7.4.8, 7.2.12 and later; FortiAnalyzer Cloud/FortiManager Cloud 7.6.4, 7.4.8, 7.2.11 and later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-26-090

Restart Required: Yes

Instructions:

1. Backup configuration. 2. Download appropriate firmware version from Fortinet support portal. 3. Upload firmware to device. 4. Install update via GUI or CLI. 5. Reboot device. 6. Verify version and functionality.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit admin account access to trusted IP addresses only

config system admin
edit admin
set trusthost1 <trusted_ip> <trusted_mask>
end

Enforce Strong Password Policies

all

Implement complex password requirements and regular rotation for admin accounts

config system password-policy
set status enable
set apply-to admin
set minimum-length 12
set change-4-characters enable
end

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to FortiAnalyzer/FortiManager management interfaces
  • Enable detailed logging and monitoring for authentication attempts and admin access patterns

🔍 How to Verify

Check if Vulnerable:

Check current version via GUI (System > Dashboard) or CLI (get system status) and compare with affected versions list

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is 7.6.4+, 7.4.8+, or 7.2.12+ for on-premises; 7.6.4+, 7.4.8+, or 7.2.11+ for cloud

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed MFA attempts followed by successful admin login
  • Admin logins from unusual IP addresses without MFA prompts
  • Consecutive authentication requests in short timeframes

Network Indicators:

  • Multiple HTTP POST requests to authentication endpoints from single source
  • Unusual authentication traffic patterns to management interfaces

SIEM Query:

source="fortianalyzer" OR source="fortimanager" (event_type="authentication" AND (result="success" OR result="failure") AND user="admin") | stats count by src_ip, user, result | where count > 5

🔗 References

📤 Share & Export