Fortinet has released urgent guidance to address CVE-2026-24858, a critical authentication bypass vulnerability in its FortiCloud Single Sign-On (SSO) service that is under active exploitation. The flaw allows a malicious actor to use their own FortiCloud account to gain unauthorized access to other customers' devices managed via the SSO feature. Attackers have been observed making unauthorized configuration changes, creating rogue admin accounts, and modifying VPN settings. The vulnerability impacts major Fortinet products like FortiOS, FortiManager, and FortiAnalyzer. In response to the immediate threat, CISA has added CVE-2026-24858 to its KEV catalog. Fortinet temporarily disabled the SSO service to apply a fix and is urging all customers to apply updates and inspect their devices for indicators of compromise.
CVE-2026-24858 is a critical authentication bypass vulnerability. It resides within the FortiCloud SSO mechanism, which is designed to centralize and simplify user authentication across various Fortinet products. The core of the issue is that the SSO service failed to properly validate the tenancy of a user, allowing an attacker authenticated to their own FortiCloud account to access and manage devices belonging to a completely different customer account.
Significantly, this vulnerability allowed attackers to bypass patches for previous, related SSO flaws (CVE-2025-59718 and CVE-2025-59719), indicating a deeper logic flaw in the authentication process.
The vulnerability affects a broad range of Fortinet's portfolio when the FortiCloud SSO feature is enabled. Products include:
This vulnerability is being actively exploited in the wild. Fortinet confirmed it observed malicious activity where attackers leveraged the flaw to make unauthorized changes to customer devices. These observations, coupled with reports from customers seeing suspicious logins on fully patched devices, triggered the emergency response. On January 27, 2026, CISA added CVE-2026-24858 to its KEV catalog, requiring federal agencies to remediate but also serving as a critical warning to all organizations using these products.
The impact of this vulnerability is critical. Gaining administrative control over network security appliances like FortiGate firewalls is a worst-case scenario. An attacker can:
Given that Fortinet products are widely used to protect network perimeters, a compromise can serve as a gateway for ransomware deployment, espionage, and large-scale data breaches.
CISA and Fortinet urge administrators to hunt for the following indicators of compromise:
| Type | Value | Description |
|---|---|---|
| Log Source | Fortinet device audit logs | Look for unexpected login events from unknown IP addresses or accounts, especially those associated with FortiCloud SSO. |
| Configuration Change | New local user accounts | Search for the creation of any unauthorized local user accounts with administrative privileges. |
| Configuration Change | Modified VPN settings | Review SSL-VPN and IPsec VPN settings for any new user groups or portal mappings that were not created by legitimate administrators. |
| Configuration Change | Firewall policy modifications | Audit firewall policies for any new allow rules that permit access from untrusted sources to internal resources. |
Audit Logs: Immediately review administrative login logs on all internet-facing Fortinet devices. Scrutinize all successful logins that used the FortiCloud SSO method. Any login from an unrecognized source IP or that does not correlate with legitimate administrator activity should be considered suspicious.
Configuration Review: Perform a full audit of the device configuration. Specifically look for:
D3FEND Techniques for Detection:
Disable SSO (Temporary): As an immediate containment step, administrators can disable FortiCloud SSO for admin login and revert to local authentication until patching is complete.
Apply Updates: Fortinet has reinstated the FortiCloud SSO service with the necessary server-side fixes. Customers should ensure their devices are running versions that incorporate the client-side patches and that they have re-established their connection to the patched FortiCloud service.
Investigate for Compromise: It is not enough to simply patch. Due to the active exploitation, all organizations using this feature must assume compromise and perform a thorough investigation based on the detection steps outlined above. If any signs of compromise are found, initiate the organization's incident response plan, revoke any unauthorized credentials, and restore configurations from a known-good backup.
Fortinet confirms CVE-2026-24858 as a zero-day, with active exploitation observed since January 20, 2026, targeting FortiGate firewalls.
Applying the latest patches and firmware updates from Fortinet is the primary method to remediate the vulnerability.
Mapped D3FEND Techniques:
Regularly auditing device configurations and administrative logs is crucial for detecting signs of compromise, such as unauthorized account creation.
While this flaw bypassed SSO, enforcing MFA on all administrative accounts (especially local ones) provides a critical layer of defense against credential-based attacks.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats