Fortinet has released urgent guidance to address CVE-2026-24858, a critical authentication bypass vulnerability in its FortiCloud Single Sign-On (SSO) service that is under active exploitation. The flaw allows a malicious actor to use their own FortiCloud account to gain unauthorized access to other customers' devices managed via the SSO feature. Attackers have been observed making unauthorized configuration changes, creating rogue admin accounts, and modifying VPN settings. The vulnerability impacts major Fortinet products like FortiOS, FortiManager, and FortiAnalyzer. In response to the immediate threat, CISA has added CVE-2026-24858 to its KEV catalog. Fortinet temporarily disabled the SSO service to apply a fix and is urging all customers to apply updates and inspect their devices for indicators of compromise.
CVE-2026-24858 is a critical authentication bypass vulnerability. It resides within the FortiCloud SSO mechanism, which is designed to centralize and simplify user authentication across various Fortinet products. The core of the issue is that the SSO service failed to properly validate the tenancy of a user, allowing an attacker authenticated to their own FortiCloud account to access and manage devices belonging to a completely different customer account.
Significantly, this vulnerability allowed attackers to bypass patches for previous, related SSO flaws (CVE-2025-59718 and CVE-2025-59719), indicating a deeper logic flaw in the authentication process.
The vulnerability affects a broad range of Fortinet's portfolio when the FortiCloud SSO feature is enabled. Products include:
This vulnerability is being actively exploited in the wild. Fortinet confirmed it observed malicious activity where attackers leveraged the flaw to make unauthorized changes to customer devices. These observations, coupled with reports from customers seeing suspicious logins on fully patched devices, triggered the emergency response. On January 27, 2026, CISA added CVE-2026-24858 to its KEV catalog, requiring federal agencies to remediate but also serving as a critical warning to all organizations using these products.
The impact of this vulnerability is critical. Gaining administrative control over network security appliances like FortiGate firewalls is a worst-case scenario. An attacker can:
Given that Fortinet products are widely used to protect network perimeters, a compromise can serve as a gateway for ransomware deployment, espionage, and large-scale data breaches.
CISA and Fortinet urge administrators to hunt for the following indicators of compromise:
allow rules that permit access from untrusted sources to internal resources.Audit Logs: Immediately review administrative login logs on all internet-facing Fortinet devices. Scrutinize all successful logins that used the FortiCloud SSO method. Any login from an unrecognized source IP or that does not correlate with legitimate administrator activity should be considered suspicious.
Configuration Review: Perform a full audit of the device configuration. Specifically look for:
D3FEND Techniques for Detection:
Disable SSO (Temporary): As an immediate containment step, administrators can disable FortiCloud SSO for admin login and revert to local authentication until patching is complete.
Apply Updates: Fortinet has reinstated the FortiCloud SSO service with the necessary server-side fixes. Customers should ensure their devices are running versions that incorporate the client-side patches and that they have re-established their connection to the patched FortiCloud service.
Investigate for Compromise: It is not enough to simply patch. Due to the active exploitation, all organizations using this feature must assume compromise and perform a thorough investigation based on the detection steps outlined above. If any signs of compromise are found, initiate the organization's incident response plan, revoke any unauthorized credentials, and restore configurations from a known-good backup.
Fortinet confirms CVE-2026-24858 as a zero-day, with active exploitation observed since January 20, 2026, targeting FortiGate firewalls.
Applying the latest patches and firmware updates from Fortinet is the primary method to remediate the vulnerability.
Mapped D3FEND Techniques:
Regularly auditing device configurations and administrative logs is crucial for detecting signs of compromise, such as unauthorized account creation.
While this flaw bypassed SSO, enforcing MFA on all administrative accounts (especially local ones) provides a critical layer of defense against credential-based attacks.
Mapped D3FEND Techniques:
Fortinet temporarily disables all FortiCloud SSO authentication to mitigate the threat.
CISA adds CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) Catalog.
Fortinet reinstates the FortiCloud SSO service after applying server-side fixes.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.