Fortinet published a PSIRT advisory on January 27 assigning CVE-2026-24858 (CVSS 9.4) to a critical FortiCloud SSO authentication bypass that has been actively exploited since mid-January. The flaw allows anyone with a FortiCloud account to authenticate to other customers’ FortiGate, FortiManager, FortiWeb, FortiProxy, and FortiAnalyzer devices—if FortiCloud SSO is enabled.

Vulnerability overview

AttributeValue
CVECVE-2026-24858
CVSS score9.4 (Critical)
Vulnerability typeAuthentication Bypass Using an Alternate Path or Channel
CWECWE-288
Exploit statusActively exploited
CISA KEV addedJanuary 27, 2026
Federal remediation deadlineFebruary 18, 2026

How the vulnerability works

CVE-2026-24858 is caused by improper access control in FortiCloud SSO:

Attack requirementDetails
AuthenticationAny valid FortiCloud account
Registered deviceAttacker needs any device registered to FortiCloud
Target requirementFortiCloud SSO enabled on victim device
User interactionNone required
Network positionRemote exploitation possible

An attacker who has registered any device to FortiCloud can exploit the flaw to authenticate to devices registered by other customers.

FortiCloud SSO exposure

MetricValue
Exposed instances (Shadowserver)~10,000 globally
US-based instances~25% of exposed devices
Default stateDisabled
Auto-enable conditionTurns on when device registered with FortiCare

FortiCloud SSO is not enabled by default, but Fortinet notes it turns on automatically when a device is registered with FortiCare unless explicitly disabled afterward.

Discovery and exploitation timeline

DateEvent
January 15, 2026Arctic Wolf observes unauthorized FortiGate configuration changes
January 21, 2026Fortinet customers report compromised devices via FortiCloud SSO
January 22, 2026Arctic Wolf confirms attacks appear automated
January 26, 2026Fortinet disables all FortiCloud SSO to mitigate exploitation
January 27, 2026Fortinet publishes advisory, assigns CVE-2026-24858
January 27, 2026CISA adds to KEV catalog
January 27, 2026Fortinet re-enables FortiCloud SSO with blocks for vulnerable devices
January 28, 2026Fortinet begins releasing patches

Attack methodology

Arctic Wolf reported the attacks appeared fully automated, completing the entire attack sequence within seconds:

PhaseAction
1Authenticate via FortiCloud SSO to victim device
2Create backdoor administrator accounts
3Create VPN-enabled accounts for persistent access
4Exfiltrate firewall configurations

Common rogue account names

Account namePurpose
auditBackdoor admin
backupBackdoor admin
itadminBackdoor admin
secadminBackdoor admin
remoteadminBackdoor admin

Exfiltrated configuration value

Data typeRisk
LDAP/AD credentialsLateral movement into Active Directory
VPN settingsPersistent remote access
Firewall rulesNetwork reconnaissance
Admin credentialsFurther device compromise
Service account passwordsPrivilege escalation

Third FortiCloud SSO bypass in months

CVE-2026-24858 is the third critical FortiCloud SSO authentication bypass disclosed recently:

CVEDisclosureType
CVE-2025-59718December 2025SSO bypass (internally discovered)
CVE-2025-59719December 2025Cryptographic signature bypass
CVE-2026-24858January 2026Net-new authentication bypass

CVE-2025-59718 and CVE-2025-59719 details

AttributeDetails
DiscoveryFortinet internal code audit
CVE-2025-59719 typeImproper Verification of Cryptographic Signature (CWE-347)
ImpactUnauthenticated bypass via crafted SAML message
Affected productsFortiOS, FortiWeb, FortiProxy, FortiSwitchManager

Organizations that patched for the earlier CVEs remained vulnerable to CVE-2026-24858 until Fortinet’s January 27 mitigations.

Affected products

ProductAffected if SSO enabled
FortiOSYes
FortiManagerYes
FortiWebYes
FortiProxyYes
FortiAnalyzerYes

Patch availability

ProductFixed versionRelease date
FortiOS7.4.11January 27, 2026
FortiManagerForthcomingTBD
FortiAnalyzerForthcomingTBD
FortiWebForthcomingTBD
FortiProxyForthcomingTBD

Fortinet’s track record

Fortinet products have appeared frequently on CISA’s Known Exploited Vulnerabilities catalog:

MetricValue
Total KEV appearances since 202124
KEV entries in 2025~8 (one-third of total)
Used in ransomware campaigns13 vulnerabilities

The repeated discovery of critical flaws in the same authentication mechanism raises questions about the underlying architecture.

Remediation steps

Immediate actions

PriorityAction
CriticalApply FortiOS 7.4.11 immediately
CriticalDisable FortiCloud SSO if patching isn’t possible
CriticalAudit all admin accounts for unauthorized entries

Disabling FortiCloud SSO

config user setting
    set forticloud-sso disable
end

Compromise assessment

CheckLocation
Admin accountsSystem > Administrators
VPN accountsUser & Authentication > User Definition
Configuration changesSystem > Event Logs
Firewall rulesPolicy & Objects > Firewall Policy

If compromise detected

ActionPurpose
Rotate all credentialsIncluding LDAP/AD service accounts
Restore from known-good backupRemove unauthorized changes
Review VPN logsIdentify unauthorized access
Block management interfaceRemove internet exposure
Engage incident responseFull forensic investigation

Strategic considerations

The pattern of repeated critical authentication bypasses in FortiCloud SSO suggests organizations should evaluate whether the convenience of cloud-based single sign-on justifies the risk exposure for security infrastructure.

ConsiderationAssessment
SSO convenienceReduced credential management
Attack surfaceExpanded by cloud integration
Repeated bypassesThree critical CVEs in months
Management exposureInternet-reachable by design

Recommendations

For Fortinet customers

PriorityAction
ImmediatePatch to FortiOS 7.4.11
ImmediateAudit for rogue accounts
HighReview need for FortiCloud SSO
HighImplement management network segmentation
OngoingMonitor Fortinet PSIRT advisories

For security teams

PriorityAction
HighAdd FortiCloud SSO to vulnerability scanning
HighReview all Fortinet device configurations
MediumConsider alternative management approaches
OngoingTrack Fortinet KEV additions

CISA guidance

CISA released an alert on January 28, 2026, advising organizations to:

  1. Apply patches immediately when available
  2. Disable FortiCloud SSO on devices without patches
  3. Audit for indicators of compromise
  4. Report suspicious activity to CISA

The federal remediation deadline of February 18, 2026, applies to all FCEB (Federal Civilian Executive Branch) agencies. Private organizations should treat this timeline as a best practice.

Context

CVE-2026-24858 exemplifies the security challenges of cloud-integrated network infrastructure. The ability for any FortiCloud account holder to authenticate to arbitrary customer devices represents a fundamental architectural failure that wasn’t caught until active exploitation.

The automated nature of the attacks—completing full compromise sequences in seconds—indicates sophisticated threat actors with advance knowledge of the vulnerability. Organizations should assume that any device with FortiCloud SSO enabled during the exploitation window may be compromised and conduct thorough forensic analysis.