Arctic Wolf reported a wave of automated attacks targeting Fortinet FortiGate firewalls beginning January 15, 2026. The attackers exploited CVE-2026-24858, a critical FortiCloud SSO authentication bypass, to gain administrative access, create backdoor accounts, and exfiltrate firewall configurations—even on devices patched against previous FortiCloud SSO vulnerabilities.

Vulnerability overview

FieldValue
CVECVE-2026-24858
CVSS9.8 (Critical)
TypeAuthentication Bypass Using an Alternate Path
CWECWE-288
Attack VectorNetwork (FortiCloud SSO)
AuthenticationRequires any FortiCloud account
CISA KEVAdded January 27, 2026
Patch Deadline (FCEB)February 18, 2026

Timeline

DateEvent
January 15, 2026Arctic Wolf first observes automated attack cluster
January 20, 2026Multiple Fortinet customers report unauthorized admin account creation
January 22, 2026Two malicious FortiCloud accounts locked out by Fortinet
January 23, 2026Fortinet confirms this is a distinct vulnerability, not a patch bypass
January 26, 2026Fortinet temporarily suspends all FortiCloud SSO authentication globally
January 27, 2026Fortinet publishes PSIRT advisory; CISA adds to KEV catalog
January 27, 2026FortiCloud SSO restored only for patched devices
January 28, 2026FortiOS 7.6.6 and 7.4.11 released with patches

The vulnerability

CVE-2026-24858 allows anyone with a FortiCloud account and a registered device to authenticate to devices registered by other FortiCloud users—if FortiCloud SSO is enabled.

RequirementDetails
Attacker needsAny FortiCloud account
Attacker needsAt least one registered device
Target requirementFortiCloud SSO enabled
AuthenticationBypasses normal user verification

This is the third FortiCloud SSO authentication bypass discovered in recent months:

CVEDiscoveryRelationship
CVE-2025-59718December 2025Original SSO bypass
CVE-2025-59719December 2025Related bypass
CVE-2026-24858January 2026New distinct vulnerability

Critical finding: Devices patched for the previous CVEs remained vulnerable to CVE-2026-24858.

Attack characteristics

Arctic Wolf observed all attack events completing within seconds of each other, indicating fully automated tooling:

Attack chain

PhaseActionTime
1Authenticate via FortiCloud SSO to victim deviceSeconds
2Create backdoor admin accounts for persistenceSeconds
3Enable VPN access for alternative entry pointsSeconds
4Download full device configurationsSeconds

Observed backdoor account names

Account namePurpose
auditAppears legitimate
backupAppears legitimate
itadminAppears legitimate
secadminAppears legitimate
remoteadminAppears legitimate

The December 2025 campaign used similar techniques, suggesting the same threat actor or shared tooling between campaigns.

What attackers gain

Stolen FortiGate configurations provide attackers with:

DataRisk
Internal IP rangesNetwork topology mapping
Routing tablesAttack path planning
VPN configurationsPersistent remote access
LDAP/AD credentialsDomain compromise
Firewall rulesSecurity gap identification
SSL VPN settingsAlternative access methods

This information enables targeted follow-on attacks against the victim’s internal network.

Post-compromise capabilities

CapabilityImpact
Network reconnaissanceFull visibility into internal structure
Credential reuseLDAP/AD credentials enable domain attacks
Persistent accessVPN accounts provide ongoing entry
Firewall manipulationDisable security controls
Lateral movementUse compromised firewall as pivot point

Affected products and patches

Affected products

ProductVulnerable
FortiOSYes
FortiManagerYes
FortiWebYes
FortiProxyYes
FortiAnalyzerYes

Fixed versions

ProductFixed VersionStatus
FortiOS7.6.6Released
FortiOS7.4.11Released
FortiManagerIn progressPatches pending
FortiAnalyzerIn progressPatches pending

Devices running earlier versions must upgrade. FortiCloud SSO is now only enabled for devices running patched firmware.

Internet exposure

The exploitation appears limited to devices with management interfaces exposed to the internet.

MetricValue
Exposed instances (Shadowserver)~10,000 globally
US exposure~25% of total
FortiCloud SSO enabledRequired for exploitation

Fortinet’s emergency response

Fortinet took the unusual step of globally suspending FortiCloud SSO as an emergency mitigation:

DateAction
January 22, 2026Two malicious FortiCloud accounts locked
January 26, 2026FortiCloud SSO disabled globally
January 27, 2026SSO re-enabled only for patched devices

“This vulnerability was found being exploited in the wild by two malicious FortiCloud accounts, which were locked out on [January 22, 2026].”

Observed malicious activity

On fully upgraded Fortinet devices, the following malicious activity was observed:

ActivityIndicator
Unauthorized firewall configuration changesModified rules, policies
Unauthorized account creationNew admin accounts
VPN configuration changesNew VPN users, modified settings
Configuration exportsFull device config downloads

Remediation

Immediate actions

PriorityAction
1Disable FortiCloud SSO until patches are applied
2Audit admin accounts—remove unauthorized accounts
3Review firewall configurations for unauthorized changes
4Restore from clean backup if modifications found
5Rotate all credentials stored on or connected to FortiGate
6Apply patches—upgrade to FortiOS 7.6.6 or 7.4.11
7Block management interface exposure to internet

Disabling FortiCloud SSO

Navigate to: System → Settings
Set "Allow administrative login using FortiCloud SSO" to Off

Credential rotation requirements

Credential typeAction
FortiGate admin accountsReset passwords
LDAP service accountsRotate in Active Directory
VPN user credentialsForce password reset
API keysRegenerate
RADIUS shared secretsUpdate on both ends

Detection indicators

Monitor for:

IndicatorMeaning
FortiCloud SSO logins from unfamiliar accountsUnauthorized access
New administrator account creationPersistence mechanism
Configuration downloads or exportsData exfiltration
VPN user account creationAlternative access
Changes to firewall rulesSecurity weakening
SSL VPN setting modificationsBackdoor creation

Log review queries

Log sourceSearch for
FortiGate event logsAdmin account creation events
FortiCloud logsSSO authentications from new sources
Configuration change logsVPN, user, rule modifications

Recommendations

For affected organizations

PriorityAction
CriticalPatch immediately (FortiOS 7.6.6/7.4.11)
CriticalAudit for IOCs listed above
CriticalAssume compromise if FortiCloud SSO was enabled
HighRotate all stored credentials
HighRemove internet exposure of management interfaces
OngoingMonitor for unauthorized changes

For security teams

PriorityAction
CriticalInventory all Fortinet devices
HighVerify patch status across fleet
HighHunt for backdoor accounts
HighReview configuration integrity
MediumEvaluate FortiCloud SSO necessity
OngoingMonitor Fortinet security advisories

Context

The repeated discovery of critical authentication bypasses in FortiCloud SSO raises questions about the underlying architecture. This is the third critical SSO bypass in recent months, and devices patched for previous vulnerabilities remained vulnerable.

Organizations should evaluate whether cloud-based single sign-on for security infrastructure introduces unacceptable risk, particularly when the authentication service itself becomes a target.

Fortinet’s decision to globally suspend FortiCloud SSO while patching indicates the severity of the threat. Organizations should maintain the ability to manage Fortinet devices through alternative methods when cloud services are unavailable.

The pattern of repeated SSO vulnerabilities suggests that FortiCloud SSO may warrant additional architectural scrutiny before re-enabling in production environments.