TL;DR

CVE-2026-24858 allows attackers with a FortiCloud account to log into other users' devices if FortiCloud SSO is enabled, leading to unauthorized configuration changes.

What happened

['Fortinet disclosed CVE-2026-24858 affecting FortiOS and related products']

Why it matters for ops

['Authentication bypass vulnerability allows unauthorized access to systems', 'Previously patched vulnerabilities did not fully address this issue']

Mitigation

  • Apply available updates as soon as they are released by Fortinet
  • Disable FortiCloud SSO temporarily until systems are updated

Action items

  • Review logs for signs of exploitation
  • Update affected devices immediately

Detection IOCs

  • Unauthorized firewall configuration changes
  • Creation of new accounts without authorization
  • Abuse of SSO to grant unauthorized access

Source link

https://www.cisa.gov/news-events/alerts/2026/01/28/fortinet-releases-guidance-address-ongoing-exploitation-authentication-bypass-vulnerability-cve-2026