Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

ByteDance reportedly pauses global launch of Seedance 2.0 video generator

AI mental illness lawyer warns of risk of mass casualties

Unacademy to be acquired by upGrad in stock-for-stock deal as India’s edtech sector consolidates

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected
Identity

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

By January 28, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 28, 2026Network security/zero day

Fortinet has begun releasing security updates to address critical flaws affecting FortiOS that are being exploited in the wild.

The vulnerability, assigned CVE identifier CVE-2026-24858 (CVSS score: 9.4), is described as an authentication bypass related to FortiOS single sign-on (SSO). This flaw also affects FortiManager and FortiAnalyzer. The company said it is continuing to investigate whether other products, such as FortiWeb and FortiSwitch Manager, are affected by this flaw.

“Authentication Bypass Vulnerability Using Alternate Paths or Channels” [CWE-288] “FortiOS, FortiManager, and FortiAnalyzer allow an attacker with a FortiCloud account and a registered device to log in to a device registered to another account if FortiCloud SSO authentication is enabled on the device,” Fortinet said in an advisory published Tuesday.

Note that the FortiCloud SSO login feature is not enabled by default factory settings. This is only turned on in scenarios where an administrator enrolls the device with FortiCare from the device GUI, unless steps are taken to explicitly toggle the “Allow administrative login using FortiCloud SSO” switch.

This development comes days after Fortinet confirmed that unidentified attackers were exploiting a “new attack path” to achieve SSO logins without requiring authentication. This access was exploited to create local administrator accounts for persistence, make configuration changes to allow those accounts VPN access, and compromise firewall configurations.

cyber security

The network security vendor announced that it has taken the following actions over the past week.

Locked out two malicious FortiCloud accounts (cloud-noc@mail.io and cloud-init@mail.io) on January 22, 2026 FortiCloud SSO was disabled on the FortiCloud side on January 26, 2026 FortiCloud SSO was re-enabled on January 27, 2026, but the option to log in from a device running a vulnerable version was disabled

This means that for FortiCloud SSO authentication to work, customers must upgrade to the latest version of the software. Fortinet also urges users who detect indicators of compromise to treat their devices as compromised and recommends the following actions:

Make sure your device is running the latest firmware version. Restore the configuration to a known clean version or audit it for unauthorized changes. Rotate credentials, including LDAP/AD accounts, that may be connected to FortiGate devices.

Due to this development, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) Catalog and requires Federal Civilian Executive Branch (FCEB) agencies to remediate the issue by January 30, 2026.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEverything you need to know about the viral personal AI assistant Clawdbot (now Moltbot)
Next Article Unmasking new TOAD attacks hidden in legitimate infrastructure

Related Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

March 14, 2026

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

ByteDance reportedly pauses global launch of Seedance 2.0 video generator

AI mental illness lawyer warns of risk of mass casualties

Unacademy to be acquired by upGrad in stock-for-stock deal as India’s edtech sector consolidates

Wiz investors unravel Google’s $32 billion acquisition

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.