Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

Posted on January 28, 2026January 28, 2026 By CWS

Ravie LakshmananJan 28, 2026Network Safety / Zero-Day
Fortinet has begun releasing safety updates to handle a crucial flaw impacting FortiOS that has come underneath lively exploitation within the wild.
The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS rating: 9.4), has been described as an authentication bypass associated to FortiOS single sign-on (SSO). The flaw additionally impacts FortiManager and FortiAnalyzer. The corporate mentioned it is persevering with to research if different merchandise, together with FortiWeb and FortiSwitch Supervisor, are impacted by the flaw.
“An Authentication Bypass Utilizing an Alternate Path or Channel vulnerability [CWE-288] in FortiOS, FortiManager, FortiAnalyzer could permit an attacker with a FortiCloud account and a registered system to log into different units registered to different accounts, if FortiCloud SSO authentication is enabled on these units,” Fortinet mentioned in an advisory launched Tuesday.

It is value noting that the FortiCloud SSO login characteristic will not be enabled within the default manufacturing unit settings. It is solely turned on in eventualities the place an administrator registers the system to FortiCare from the system’s GUI, except they’ve taken steps to explicitly toggle the “Permit administrative login utilizing FortiCloud SSO” swap.
The event comes days after Fortinet confirmed that unidentified risk actors have been abusing a “new assault path” to realize SSO logins with out requiring any authentication. The entry was abused to create native admin accounts for persistence, make configuration modifications granting VPN entry to these accounts, and exfiltrate these firewall configurations.

Over the previous week, the community safety vendor mentioned it has taken the next steps –

Locked out two malicious FortiCloud accounts ([email protected] and [email protected]) on January 22, 2026
Disabled FortiCloud SSO on the FortiCloud facet on January 26, 2026
Re-enabled FortiCloud SSO on January 27, 2026, however disabling the choice to login from units working susceptible variations

In different phrases, prospects are required to improve to the most recent variations of the software program for the FortiCloud SSO authentication to perform. Fortinet can also be urging customers who detect indicators of compromise to deal with their units as breached and recommends the next actions –

Make sure the system is working the most recent firmware model
Restore configuration with a recognized clear model or audit for any unauthorized modifications
Rotate credentials, together with any LDAP/AD accounts which may be linked to the FortiGate units

The event has led the U.S. Cybersecurity and Infrastructure Safety Company (CISA) so as to add CVE-2026-24858 to its Identified Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Government Department (FCEB) companies to remediate the problems by January 30, 2026.

The Hacker News Tags:Active, CVE202624858, Detected, Exploitation, Fortinet, FortiOS, Patches, SSO

Post navigation

Previous Post: Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code
Next Post: OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code

Related Posts

Severe Vulnerability Exploited in Flowise AI Platform Severe Vulnerability Exploited in Flowise AI Platform The Hacker News
ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability The Hacker News
Google Resolves Critical Security Flaws in Gemini CLI Tools Google Resolves Critical Security Flaws in Gemini CLI Tools The Hacker News
CISA Flags Critical F5 BIG-IP Vulnerability Exploitation CISA Flags Critical F5 BIG-IP Vulnerability Exploitation The Hacker News
New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally The Hacker News
Pentests once a year? Nope. It’s time to build an offensive SOC Pentests once a year? Nope. It’s time to build an offensive SOC The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark