Security advisories

Confirmed Zero-day Vulnerability in Fortinet Products (CVE-2026-24858)

January 28, 2026 | 3 MINS READ

Speak With A Security Expert Now

TALK TO AN EXPERT

THE THREAT

On January 27th, 2026, Fortinet released a security advisory disclosing a zero-day vulnerability impacting multiple Fortinet products. The flaw, tracked as CVE-2026-24858 (CVSS: 9.8), is a critical authentication bypass vulnerability in FortiOS, FortiManager, FortiAnalyzer, and FortiProxy. It allows an attacker with a FortiCloud account and a registered device to authenticate into devices registered to other accounts via an alternate authentication path or channel. The vulnerability can only be exploited on devices with FortiCloud Single Sign-On (SSO) enabled.

Security patches for the affected product versions are under development at the time of writing. Fortinet stated that the SSO login feature will not allow login from devices running vulnerable versions. Organizations are advised to update vulnerable instances to secure versions as soon as patches become available.

What we're doing about it

What you should do about it

Additional information

On January 22nd, Fortinet investigated reports from customers about malicious SSO login activity that involved two attacker-controlled FortiCloud accounts being used to access victim devices. Security researchers also observed similar activity involving the creation of generic accounts to maintain persistence, changes to grant VPN access, and exfiltration of firewall configuration data. This activity was initially believed to be linked to a patch bypass of another authentication bypass vulnerability, CVE-2025-59718, which had been disclosed, patched, and reported as exploited in the wild in December 2025. Due to the similarities in the exploitation patterns, the recent activity was attributed to the previously patched flaw.

Recent disclosure confirms that the two flaws differ, with CVE-2026-24858 being an authentication bypass by an alternate path or channel, and CVE-2025-59718 occurring due to improper verification of a cryptographic signature.

Following the disclosure, CISA added CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) catalog, providing federal agencies only three days to mitigate the flaw. On January 26th, Fortinet globally disabled FortiCloud SSO logins from the server side to prevent further exploitation, and re-enabled it on January 27th, ensuring logins from vulnerable instances are blocked. Fortinet also noted that the issue affects all SAML SSO implementations. While logins from vulnerable devices are currently restricted, organizations can still disable FortiCloud SSO on the client side as an additional precaution. FortiWeb and FortiSwitch Manager are still under investigation to determine the impact of the flaw.

Fortinet vulnerabilities are often targeted by threat actors, as they provide easy access to an organization's network. Recent activity included the creation of secondary administrator accounts and exfiltration of configuration data, indicating attempts to establish persistence and map the victim network. This suggests potential efforts for long-term access to compromise networks in the future. Organizations are therefore advised to check for signs of compromise, and Fortinet recommends contacting them if any associated Indicators of Compromise (IoCs) are observed. 

Indicators of Compromise (IoCs)
Indicator Type
[email protected] SSO Login User Account
[email protected] SSO Login User Account
104[.]28.244.115 IP Address
104[.]28.212.114 IP Address
104[.]28.212.115 IP Address
104[.]28.195.105 IP Address
104[.]28.195.106 IP Address
104[.]28.227.106 IP Address
104[.]28.227.105 IP Address
104[.]28.244.114 IP Address
37[.]1.209.19 Additional IPs observed
217[.]119.139.50 Additional IPs observed
audit Malicious Login Account Created
backup Malicious Login Account Created
itadmin Malicious Login Account Created
secadmin Malicious Login Account Created
support Malicious Login Account Created
backupadmin Malicious Login Account Created
deploy Malicious Login Account Created
remoteadmin Malicious Login Account Created
security Malicious Login Account Created
svcadmin Malicious Login Account Created
system Malicious Login Account Created

References: 
[1] https://www.fortiguard.com/psirt/FG-IR-26-060 
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-24858 
[3] https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios 
[4] https://nvd.nist.gov/vuln/detail/CVE-2025-59718 
[5] https://www.cisa.gov/news-events/alerts/2026/01/27/cisa-adds-one-known-exploited-vulnerability-catalog

View Most Recent Advisories