CVE-2026-24858 is a critical (CVSS 9.8) Fortinet authentication bypass vulnerability in FortiOS, FortiManager, and more, currently under active exploitation.
| Product | Version Start | Version End (excl.) | Status |
|---|---|---|---|
| fortianalyzer | 7.0.0 | 7.0.15 | vulnerable |
| fortianalyzer | 7.2.0 | 7.2.11 | vulnerable |
| fortianalyzer | 7.4.0 | 7.4.10 | vulnerable |
| fortianalyzer | 7.6.0 | 7.6.6 | vulnerable |
| fortimanager | 7.0.0 | 7.0.15 | vulnerable |
| fortimanager | 7.2.0 | 7.2.11 | vulnerable |
| fortimanager | 7.4.0 | 7.4.10 | vulnerable |
| fortimanager | 7.6.0 | 7.6.6 | vulnerable |
| fortiproxy | 7.0.0 | 7.0.22 | vulnerable |
| fortiproxy | 7.2.0 | 7.2.15 | vulnerable |
| fortiproxy | 7.4.0 | 7.4.12 | vulnerable |
| fortiproxy | 7.6.0 | 7.6.4 | vulnerable |
| fortiweb | 7.4.0 | 7.4.11 | vulnerable |
| fortiweb | 7.6.0 | 7.6.6 | vulnerable |
| fortiweb | 8.0.0 | 8.0.3 | vulnerable |
| fortios | 7.0.0 | 7.0.18 | vulnerable |
| fortios | 7.2.0 | 7.2.12 | vulnerable |
| fortios | 7.4.0 | 7.4.11 | vulnerable |
| fortios | 7.6.0 | 7.6.6 | vulnerable |
Immediately apply the security updates provided by Fortinet. Consult the FortiGuard PSIRT advisory FG-IR-26-060 to identify the specific firmware release required for your hardware model and deployment configuration.
Upgrade to the following versions or higher: FortiOS 7.4.11/7.6.6; FortiManager and FortiAnalyzer 7.4.10/7.6.6; FortiProxy 7.0.23, 7.2.16, 7.4.13, or 7.6.5; and FortiWeb 7.4.12, 7.6.7, or 8.0.4.
If patching cannot be performed immediately, disable FortiCloud SSO authentication on all affected devices. Additionally, ensure management interfaces are not exposed to the public internet and are restricted to trusted administrative subnets.
Review system logs for 'FortiCloud SSO' login events. Investigate any successful authentications from unrecognized account IDs or unexpected geographic locations, and audit administrative accounts for unauthorized additions or configuration changes.
Security teams should monitor device logs for successful authentication events involving FortiCloud SSO where the user is not a recognized administrator. Specifically, look for log entries indicating logins from external FortiCloud IDs that do not belong to your organization. Network-level detection should focus on unusual traffic to management ports (HTTPS/443, 541) from unknown IP addresses. Implementing the specific IOCs and log patterns detailed in Fortinet's FG-IR-26-060 advisory into your SIEM is highly recommended.
Experience superior visibility and a simpler approach to cyber risk management