Fortinet Fixes Actively Exploited FortiOS SSO Auth Bypass

Fortinet has begun rolling out security updates to address a critical authentication bypass vulnerability in FortiOS that is actively exploited in the wild, prompting CISA to add it to the Known Exploited Vulnerabilities (KEV) catalog.
Vulnerability Overview
- CVE: CVE-2026-24858
- Severity: CVSS 9.4 (Critical)
- Weakness: Authentication Bypass via Alternate Path (CWE-288)
- Affected Products:
- FortiOS
- FortiManager
- FortiAnalyzer
- FortiProxy
- FortiWeb
- (FortiSwitch Manager still under investigation)
What’s the Issue?
If FortiCloud Single Sign-On (SSO) is enabled, an attacker with a FortiCloud account and a registered device could log into devices registered to other customers, bypassing authentication entirely.
Fortinet confirmed attackers abused this access to:
- Create local admin accounts for persistence
- Modify configurations to grant VPN access
- Exfiltrate firewall configurations
Important: FortiCloud SSO is not enabled by default, but may be turned on when devices are registered to FortiCare via the GUI unless explicitly disabled.
Offensive Security, Bug Bounty Courses
Fortinet’s Response Timeline
- Jan 22, 2026: Two malicious FortiCloud accounts locked
- Jan 26, 2026: FortiCloud SSO disabled globally
- Jan 27, 2026: SSO re-enabled only for patched devices (login blocked on vulnerable versions)
As a result, FortiCloud SSO will not function until devices are upgraded.
CISA Action
CISA has added CVE-2026-24858 to the KEV catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate by January 30, 2026.
CISA further clarified that exploitation may impact FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb when FortiCloud SSO is enabled.
What You Should Do Now
If you run affected Fortinet products:
- Upgrade immediately to the latest firmware versions
- Audit configurations and restore from a known-good backup if compromise is suspected
- Rotate credentials, including any linked LDAP/AD accounts
- Hunt for IoCs on all internet-exposed Fortinet devices
- Confirm whether FortiCloud SSO is enabled and restrict it where unnecessary
Note: The issue only affects FortiCloud SSO — third-party SAML IdPs and FortiAuthenticator are not impacted.
Trending: Offensive Security Tool: APKScope
Why This Matters
This is a cross-tenant authentication bypass affecting perimeter security devices. Successful exploitation grants administrative access without credentials, making it a high-impact, low-complexity attack path—especially dangerous for exposed firewalls.
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Sources: thehackernews.com, cisa.gov/news-events/alerts/2026/01/27/cisa-adds-one-known-exploited-vulnerability-catalog












