• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

You are here: Home / General Cyber Security News / Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
January 28, 2026

Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild.

The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS score: 9.4), has been described as an authentication bypass related to FortiOS single sign-on (SSO). The flaw also affects FortiManager and FortiAnalyzer. The company said it’s continuing to investigate if other products, including FortiWeb and FortiSwitch Manager, are impacted by the flaw.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS, FortiManager, FortiAnalyzer may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices,” Fortinet said in an advisory released Tuesday.

It’s worth noting that the FortiCloud SSO login feature is not enabled in the default factory settings. It’s only turned on in scenarios where an administrator registers the device to FortiCare from the device’s GUI, unless they have taken steps to explicitly toggle the “Allow administrative login using FortiCloud SSO” switch.

The development comes days after Fortinet confirmed that unidentified threat actors were abusing a “new attack path” to achieve SSO logins without requiring any authentication. The access was abused to create local admin accounts for persistence, make configuration changes granting VPN access to those accounts, and exfiltrate those firewall configurations.

Cybersecurity

Over the past week, the network security vendor said it has taken the following steps –

  • Locked out two malicious FortiCloud accounts ([email protected] and [email protected]) on January 22, 2026
  • Disabled FortiCloud SSO on the FortiCloud side on January 26, 2026
  • Re-enabled FortiCloud SSO on January 27, 2026, but disabling the option to login from devices running vulnerable versions

In other words, customers are required to upgrade to the latest versions of the software for the FortiCloud SSO authentication to function. Fortinet is also urging users who detect signs of compromise to treat their devices as breached and recommends the following actions –

  • Ensure the device is running the latest firmware version
  • Restore configuration with a known clean version or audit for any unauthorized changes
  • Rotate credentials, including any LDAP/AD accounts that may be connected to the FortiGate devices

The development has led the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to remediate the issues by January 30, 2026.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «whatsapp rolls out lockdown style security mode to protect targeted users WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
  • ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services
  • CTEM in Practice: Prioritization, Validation, and Outcomes That Matter
  • Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas
  • China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
  • Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation
  • Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
  • Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code

Copyright © TheCyberSecurity.News, All Rights Reserved.