Article Details
Scrape Timestamp (UTC): 2026-01-28 16:33:46.773
Source: https://www.theregister.com/2026/01/28/fortinet_forticloud_vuln/
Original Article Text
Click to Toggle View
Fortinet unearths another critical bug as SSO accounts borked post-patch. More work for admins on the cards as they await a full dump of fixes. Things aren't over yet for Fortinet customers – the security shop has disclosed yet another critical FortiCloud SSO vulnerability. Those hoping for a reprieve following last week's patch pantomime are out of luck. After users reported successful compromises of FortiCloud SSO accounts, despite being patched against an earlier flaw, the vendor confirmed there was an alternate attack path. According to a security advisory published Tuesday, that alternate path was assigned a separate vulnerability identifier (CVE-2026-24858, CVSS 9.4), and the company disabled FortiCloud SSO connections made from vulnerable versions. Patches are not yet ready. Fortinet confirmed that CVE-2026-24858, an authentication bypass bug, was exploited in the wild by two malicious FortiCloud accounts, but these were blocked as of January 22. Customers of FortiAnalyzer, FortiManager, FortiOS, and FortiProxy are all affected and should upgrade to the version recommended in the advisory to restore FortiCloud SSO services. Some versions have safe releases available already, although patches are still in the works for most. FortiWeb and FortiSwitch Manager are still being investigated for their exposure to the security flaws. The original attacks were first spotted by Arctic Wolf around January 15, and seemed to involve two bugs Fortinet patched in December, CVE-2025-59718 and CVE-2025-59719. The vulnerabilities in question allowed attackers to bypass SSO checks using specially crafted SAML responses, and the observed attacks appeared to be using CVE-2025-59718 to compromise firewalls. Fortinet confirmed on January 22 that the attacks were indeed bypassing that December patch, exploiting FortiCloud SSO, but doing so through alternate means. The patch was effective against one attack path, but not via this separate one. Carl Windsor, CISO at Fortinet, warned at the time that although the attacks of which the company was aware only targeted FortiCloud SSO, all SAML-based SSO implementations were vulnerable. The latest advisory states that the authentication bypass flaw can be exploited by an attacker, provided certain conditions are met. "An authentication bypass using an alternate path or channel vulnerability in FortiOS, FortiManager, FortiAnalyzer may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices." "Please note that the FortiCloud SSO login feature is not enabled in default factory settings. However, when an administrator registers the device to FortiCare from the device's GUI, unless the administrator disables the toggle switch 'Allow administrative login using FortiCloud SSO' in the registration page, FortiCloud SSO login is enabled upon registration."
Daily Brief Summary
Fortinet has disclosed a new critical vulnerability (CVE-2026-24858) affecting FortiCloud SSO, with a CVSS score of 9.4, despite recent patches for previous flaws.
The vulnerability allows authentication bypass, enabling attackers to access devices registered to different accounts if certain conditions are met.
Affected products include FortiAnalyzer, FortiManager, FortiOS, and FortiProxy, with some safe versions available, though comprehensive patches are still pending.
Initial attacks were detected by Arctic Wolf, exploiting the vulnerability through alternate means, bypassing earlier patches from December.
Fortinet has blocked the two malicious accounts exploiting this flaw and advises customers to upgrade to recommended versions to mitigate risks.
The vulnerability impacts any SAML-based SSO implementations, prompting a broader security review beyond FortiCloud SSO.
Administrators are urged to disable the "Allow administrative login using FortiCloud SSO" option during device registration to prevent unauthorized access.
Fortinet continues to investigate potential exposures in FortiWeb and FortiSwitch Manager, with further updates anticipated.