CVE-2026-24858

9.8 CRITICAL CISA KEV

📋 TL;DR

This authentication bypass vulnerability allows attackers with a FortiCloud account and registered device to log into other organizations' Fortinet devices when FortiCloud SSO authentication is enabled. It affects multiple Fortinet products across various versions. Organizations using affected Fortinet products with FortiCloud SSO enabled are vulnerable.

💻 Affected Systems

Products:
  • FortiAnalyzer
  • FortiManager
  • FortiOS
  • FortiProxy
  • FortiWeb
Versions: FortiAnalyzer 7.0.0-7.0.15, 7.2.0-7.2.11, 7.4.0-7.4.9, 7.6.0-7.6.5; FortiManager 7.0.0-7.0.15, 7.2.0-7.2.11, 7.4.0-7.4.9, 7.6.0-7.6.5; FortiOS 7.0.0-7.0.18, 7.2.0-7.2.12, 7.4.0-7.4.10, 7.6.0-7.6.5; FortiProxy 7.0.0-7.0.22, 7.2.0-7.2.15, 7.4.0-7.4.12, 7.6.0-7.6.4; FortiWeb 7.4.0-7.4.11, 7.6.0-7.6.6, 8.0.0-8.0.3
Operating Systems: FortiOS-based systems
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when FortiCloud SSO authentication is enabled on affected devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to critical network security devices, potentially compromising entire organizational networks, exfiltrating sensitive data, and deploying ransomware.

🟠

Likely Case

Attackers access network security devices to modify configurations, create backdoors, intercept traffic, or pivot to internal systems.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to specific security devices, allowing quick detection and response.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a FortiCloud account and registered device. CISA has added this to its Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiAnalyzer 7.6.6+, 7.4.10+, 7.2.12+, 7.0.16+; FortiManager 7.6.6+, 7.4.10+, 7.2.12+, 7.0.16+; FortiOS 7.6.6+, 7.4.11+, 7.2.13+, 7.0.19+; FortiProxy 7.6.5+, 7.4.13+, 7.2.16+, 7.0.23+; FortiWeb 8.0.4+, 7.6.7+, 7.4.12+

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-26-060

Restart Required: Yes

Instructions:

1. Download appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or CLI. 4. Reboot device. 5. Verify version and functionality.

🔧 Temporary Workarounds

Disable FortiCloud SSO

all

Temporarily disable FortiCloud SSO authentication on all affected devices

config system global
set fortisandbox-cloud disable
set fortiguard-anycast disable
end

Restrict Administrative Access

all

Limit administrative access to trusted IP addresses only

config system admin
edit admin_user
set trusthost1 192.168.1.0 255.255.255.0
end

🧯 If You Can't Patch

  • Disable FortiCloud SSO authentication immediately
  • Implement strict network segmentation to isolate Fortinet devices from critical systems

🔍 How to Verify

Check if Vulnerable:

Check if FortiCloud SSO is enabled: 'get system sso-forticloud' and verify device is in affected version range

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify firmware version is patched: 'get system status' and confirm FortiCloud SSO functionality works properly

📡 Detection & Monitoring

Log Indicators:

  • Unexpected administrative logins from unknown IPs
  • SSO authentication failures followed by successful logins
  • Configuration changes from unexpected sources

Network Indicators:

  • Unusual outbound connections from Fortinet devices
  • Authentication requests to FortiCloud from unexpected sources

SIEM Query:

source="fortigate" AND (eventtype="admin_login" OR eventtype="authentication") AND (src_ip NOT IN [trusted_ips])

🔗 References

📤 Share & Export