Fortinet Confirms Critical FortiCloud SSO Vulnerability(CVE-2026-24858) Actively Exploited in the Wild


Fortinet has confirmed a critical authentication bypass vulnerability in its FortiCloud SSO feature, actively exploited in the wild under CVE-2026-24858.

According to an advisory published on January 27, 2026, the flaw affects FortiOS, FortiManager, FortiAnalyzer, and FortiProxy. With a CVSSv3 score of 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it stems from improper access control (CWE-288) in the GUI component.

Attackers possessing a FortiCloud account and a registered device can log into other devices registered to different accounts if FortiCloud SSO is enabled.

Notably, this feature is not active by default but is enabled during FortiCare registration from the GUI unless administrators explicitly disable the “Allow administrative login using FortiCloud SSO” toggle.

Exploitation Details and Threat Actor Activity

Fortinet detected exploitation by two malicious FortiCloud accounts, locked out on January 22, 2026. To safeguard customers, the vendor disabled FortiCloud SSO on the cloud side on January 26, re-enabling it the next day, and now blocking logins from vulnerable versions.

Post-authentication, attackers downloaded customer config files for reconnaissance and created persistent local admin accounts.

google

Main operations include config exfiltration and admin privilege escalation. Fortinet urges reviewing all admin accounts for anomalies. Products under investigation include FortiWeb and FortiSwitch Manager.

Urgent upgrades are essential. Fortinet provides an upgrade path tool. Below is a table of affected versions:

ProductAffected VersionsSolution
FortiAnalyzer 7.67.6.0 through 7.6.5Upgrade to 7.6.6 or above
FortiAnalyzer 7.47.4.0 through 7.4.9Upgrade to 7.4.10 or above
FortiAnalyzer 7.27.2.0 through 7.2.11Upgrade to 7.2.12 or above
FortiAnalyzer 7.07.0.0 through 7.0.15Upgrade to 7.0.16 or above
FortiAnalyzer 6.4Not affectedN/A
FortiManager 7.67.6.0 through 7.6.5Upgrade to 7.6.6 or above
FortiManager 7.47.4.0 through 7.4.9Upgrade to 7.4.10 or above
FortiManager 7.27.2.0 through 7.2.11Upgrade to 7.2.13 or above
FortiManager 7.07.0.0 through 7.0.15Upgrade to 7.0.16 or above
FortiManager 6.4Not affectedN/A
FortiOS 7.67.6.0 through 7.6.5Upgrade to 7.6.6 or above
FortiOS 7.47.4.0 through 7.4.10Upgrade to 7.4.11 or above
FortiOS 7.27.2.0 through 7.2.12Upgrade to 7.2.13 or above
FortiOS 7.07.0.0 through 7.0.18Upgrade to 7.0.19 or above
FortiOS 6.4Not affectedN/A
FortiProxy 7.67.6.0 through 7.6.4Upgrade to 7.6.6 or above
FortiProxy 7.47.4.0 through 7.4.12Upgrade to 7.4.13 or above
FortiProxy 7.2All versionsMigrate to fixed release
FortiProxy 7.0All versionsMigrate to fixed release

Indicators of Compromise

Fortinet shared IoCs for threat hunting. Review logs for these signs of compromise:

TypeIoC Value
SSO Login Accountscloud-noc@mail[.]io
cloud-init@mail[.]io
IP Addresses104.28.244[.]115
104.28.212[.]114
104.28.212[.]115
104.28.195[.]105
104.28.195[.]106
104.28.227[.]106
104.28.227[.]105
104.28.244[.]114
37.1.209[.]19
217.119.139[.]50
Malicious Local Accountsaudit
backup
itadmin
secadmin
support
backupadmin
deploy
remoteadmin
security
svcadmin
system

Actors shifted to Cloudflare-protected IPs; emails may evolve post-neutralization.

Mitigations

FortiCloud SSO now rejects vulnerable devices, but disable it locally if needed:

  • FortiOS/FortiProxy CLI: textconfig system global set admin-forticloud-sso-login disable end
  • FortiManager/FortiAnalyzer CLI: textconfig system saml set forticloud-sso disable end

GUI paths: System > Settings (toggle off) or System Settings > SAML SSO.

Fortinet temporarily disabled its FortiCloud Single Sign-On (SSO) service after confirming active exploitation of a zero-day authentication bypass vulnerability in multiple products.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link