Is a New Fortinet SSO Flaw Putting Your Firewall at Risk?

Is a New Fortinet SSO Flaw Putting Your Firewall at Risk?

Federal authorities and cybersecurity researchers are raising the alarm over a critical vulnerability in Fortinet’s FortiCloud single sign-on service that is not just theoretical but is being actively exploited in the wild. This significant security flaw, tracked as CVE-2026-24858, creates a dangerous loophole allowing an attacker, who already possesses a FortiCloud account and a registered device, to gain unauthorized access to other users’ devices where FortiCloud SSO authentication is enabled. The immediate and tangible nature of this threat has prompted swift action from government agencies and security firms, who are urging organizations to take immediate steps to mitigate their exposure. The vulnerability’s exploitation vector underscores a growing concern in the industry regarding the security of centralized authentication systems, which, while convenient, can become a single point of failure with far-reaching consequences if compromised. This incident serves as a stark reminder that even trusted security infrastructure requires constant vigilance and prompt patching to defend against evolving adversarial tactics.

Understanding the Exploit and Its Impact

The mechanism behind this exploit allows a malicious actor to leverage a legitimate, albeit separate, FortiCloud account to pivot and gain control over another organization’s network appliances. Once they have successfully bypassed the SSO authentication, the attackers are not wasting any time. The Cybersecurity and Infrastructure Security Agency (CISA) has confirmed a range of malicious activities stemming from this breach. Attackers have been observed altering firewall configurations on FortiGate devices, a move that can effectively dismantle a network’s primary defense layer. Furthermore, they are creating unauthorized user accounts to establish persistence, ensuring they maintain a foothold within the compromised environment for future activities. To compound the damage, these threat actors are also modifying VPN accounts. This action not only compromises secure remote access but also serves as a gateway to compromise additional systems and exfiltrate sensitive data, turning a single vulnerability into a widespread network intrusion with potentially devastating consequences for data privacy and operational integrity.

The official response to this threat has been swift and severe, reflecting the gravity of its active exploitation. CISA has officially added CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) catalog, a directive that mandates federal agencies to patch the flaw within a specific timeframe and serves as a strong advisory for private sector organizations. The scale of the exposure is considerable; security organization Shadowserver has reported its scans identified approximately 10,000 vulnerable instances exposed online, indicating a large attack surface for threat actors. Security firm Arctic Wolf has observed that the attacks appear to be highly automated, a finding that suggests a sophisticated and widespread campaign. Analysts noted a distinct pattern where attackers download the firewall’s configuration files within mere seconds of a successful SSO authentication. This rapid, programmatic action, first observed around January 15th, points to a well-orchestrated effort to quickly harvest system information and identify further weaknesses before defenders have a chance to react, making manual detection nearly impossible.

A Pattern of Vulnerabilities and the Path Forward

This recent incident does not exist in a vacuum; it follows the discovery of similar SSO bypass vulnerabilities in December, which were identified as CVE-2025-59718 and CVE-2025-59719. The emergence of a new, distinct exploit so soon after the previous ones highlights a persistent challenge in securing complex authentication systems. A critical point that authorities are stressing is that the patches and mitigations applied for the December flaws do not offer any protection against this new vulnerability. This distinction is crucial, as it means organizations that diligently patched their systems previously may now have a false sense of security. The need for a separate, immediate upgrade to address CVE-2026-24858 is paramount. This recurring pattern of similar, yet distinct, vulnerabilities underscores the cat-and-mouse game between security vendors and threat actors, where attackers continuously probe for new weaknesses in system logic, and defenders must remain perpetually vigilant to keep pace with the evolving threat landscape.

In response to the active exploitation, Fortinet took decisive action to contain the threat and protect its customer base. The company temporarily disabled the FortiCloud SSO service entirely to halt any ongoing or potential abuse while its security teams worked on a permanent solution. After addressing the underlying issue, the service was restored, and the company released comprehensive guidance for its users. The central message was an urgent call for all affected customers to upgrade their systems to a secure, patched version of the software. To enforce this critical security measure, Fortinet stated that access for unpatched, vulnerable devices would no longer be supported, effectively compelling organizations to apply the necessary updates to maintain functionality. This series of actions, from service suspension to mandatory patching, reflected the vendor’s recognition of the high-risk nature of the vulnerability and the need for a swift, coordinated response to safeguard networks against further compromise.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later