PT-2026-5008 · Fortinet · Fortimanager+2

Michele Damico

·

Published

2026-01-27

·

Updated

2026-03-15

·

CVE-2026-24858

CVSS v2.0
10
VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions FortiAnalyzer versions 7.0.0 through 7.6.5 FortiManager versions 7.0.0 through 7.6.5 FortiOS versions 7.0.0 through 7.6.5 FortiProxy versions 7.0.0 through 7.6.4 FortiWeb versions 7.4.0 through 8.0.3
Description A critical authentication bypass vulnerability exists in Fortinet products when FortiCloud Single Sign-On (SSO) is enabled. This flaw allows an attacker with a valid FortiCloud account and a registered device to gain unauthorized access to other customers’ devices registered to different accounts. Active exploitation of this vulnerability has been observed, with attackers creating rogue admin accounts and potentially exfiltrating sensitive configuration data. The vulnerability is actively exploited in the wild, and has been assigned CVE-2026-24858. Fortinet has temporarily disabled FortiCloud SSO and is blocking logins from vulnerable firmware versions. The vulnerability allows attackers to bypass authentication and gain administrative access, potentially leading to lateral movement within networks.
Recommendations FortiAnalyzer versions 7.0.0 through 7.6.5: Upgrade to a fixed version. FortiManager versions 7.0.0 through 7.6.5: Upgrade to a fixed version. FortiOS versions 7.0.0 through 7.6.5: Upgrade to a fixed version. FortiProxy versions 7.0.0 through 7.6.4: Upgrade to a fixed version. FortiWeb versions 7.4.0 through 8.0.3: Upgrade to a fixed version. If upgrading is not immediately possible, disable FortiCloud SSO. Audit admin accounts for any newly created or suspicious accounts. Monitor for anomalous login activity.

Fix

LPE

RCE

Authentication Bypass Using an Alternate Path or Channel

Weakness Enumeration

Related Identifiers

BDU:2026-00882
CVE-2026-24858

Affected Products

Fortianalyzer
Fortimanager
Fortios