Open Nav
Sign Up

Guidance to Address Ongoing Exploitation of Fortinet SSO Vulnerability (CVE-2026-24858)

cve-2026-24858

Filip Dimitrov

January 29, 2026

CVE-2026-24858 is a critical authentication bypass in FortiCloud Single Sign-On (SSO) that can allow an attacker with a FortiCloud account and a registered device to authenticate to other organizations’ devices (registered to other FortiCloud accounts) when FortiCloud SSO administrative login is enabled.

Fortinet observed real-world exploitation and took cloud-side actions (locking malicious accounts and temporarily disabling FortiCloud SSO). Even if organizations were fully updated for earlier FortiCloud SSO issues, this was described as a new attack path.

Affected Products and Versions

Multiple Fortinet products are affected, including::

  • FortiOS: 7.6.0–7.6.5, 7.4.0–7.4.10, 7.2.0–7.2.12, 7.0.0–7.0.18
  • FortiManager: 7.6.0–7.6.5, 7.4.0–7.4.9, 7.2.0–7.2.11, 7.0.0–7.0.15
  • FortiAnalyzer: 7.6.0–7.6.5, 7.4.0–7.4.9, 7.2.0–7.2.11, 7.0.0–7.0.15
  • FortiProxy / FortiWeb: also listed in NVD as affected when FortiCloud SSO is enabled

Note: FortiCloud SSO admin login is not enabled by default in factory settings, but may be enabled during device registration workflows unless explicitly disabled.

Observed Exploitation Chain

Fortinet’s incident analysis indicates that attackers have abused FortiCloud SSO access to authenticate to affected devices and subsequently create local administrator accounts to establish persistence. 

In many cases, this initial access was followed by additional configuration changes, including modifications that could enable continued or expanded remote administrative access. 

In response to the observed exploitation, Fortinet reported disabling abused FortiCloud accounts on January 23, temporarily disabling FortiCloud SSO at the cloud level on January 26, and restoring the service on January 27 with additional restrictions designed to prevent logins from vulnerable firmware versions.

Indicators of Compromise (IOCs) Published by Fortinet

Fortinet published concrete IOCs and log artifacts to support validation and threat hunting.

Observed SSO login usernames

  • cloud-noc@mail.io
  • cloud-init@mail.io

Observed source IPs (Fortinet-confirmed)

  • 104[.]28.244.115
  • 104[.]28.212.114

Additional source IPs (third-party reporting, included by Fortinet)

  • 37[.]1.209.19
  • 217[.]119.139.50

Observed malicious local admin usernames (examples)

  • audit
  • backup
  • itadmin
  • secadmin
  • support

Relevant log artifacts to hunt

  • Successful administrative logins using FortiCloud SSO (e.g., method=”sso”, ui=”sso(<ip>)”, user=”<IOC email>”)
  • Creation of new administrative users under system.admin shortly after an SSO login event

Mitigation and Recommendations

Apply the latest patch. Fortinet has released fixed firmware versions addressing CVE-2026-24858 across affected product lines.

Disable FortiCloud SSO administrative login where not required, especially on internet-exposed management planes. Fortinet provided a GUI and CLI approach: set admin-forticloud-sso-login disable.

Restrict administrative interface access by setting local-in policy / trusted IP allowlisting for management access.

For more details, please see the official guidance from Fortinet here.

Stay Safe. Stay Secure

OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.