9.8 CVE-2026-24858
CISA Kev Catalog
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
https://nvd.nist.gov/vuln/detail/CVE-2026-24858
Categories
CWE-288
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
| https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios Mitigation Vendor Advisory |
psirt@fortinet.com
| https://fortiguard.fortinet.com/psirt/FG-IR-26-060 Vendor Advisory |
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* | >= 7.0.0 | <= 7.0.15 |
| cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* | >= 7.2.0 | <= 7.2.11 |
| cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* | >= 7.4.0 | < 7.4.10 |
| cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* | >= 7.6.0 | < 7.6.5 |
| cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* | >= 7.0.0 | <= 7.0.15 |
| cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* | >= 7.2.0 | <= 7.2.11 |
| cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* | >= 7.4.0 | < 7.4.10 |
| cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* | >= 7.6.0 | <= 7.6.5 |
| cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* | >= 7.0.0 | <= 7.4.12 |
| cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* | >= 7.6.0 | <= 7.6.4 |
| cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:* | >= 7.4.0 | <= 7.4.11 |
| cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:* | >= 7.6.0 | <= 7.6.6 |
| cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:* | >= 8.0.0 | <= 8.0.3 |
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | >= 7.0.0 | <= 7.0.18 |
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | >= 7.2.0 | <= 7.2.12 |
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | >= 7.4.0 | < 7.4.11 |
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | >= 7.6.0 | <= 7.6.5 |
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
Other Nist (github, ...)
| Url |
|---|
| No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
