Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsFortinet Confirms CVE-2026-24858 SSO Flaw Under Active Attack
Fortinet Confirms CVE-2026-24858 SSO Flaw Under Active Attack
Cybersecurity

Fortinet Confirms CVE-2026-24858 SSO Flaw Under Active Attack

•January 28, 2026
0
eSecurity Planet
eSecurity Planet•Jan 28, 2026

Companies Mentioned

Fortinet

Fortinet

FTNT

Cloudflare

Cloudflare

NET

Why It Matters

The vulnerability undermines core network security controls, exposing enterprises to cross‑tenant takeover and data exfiltration, and forces organizations to reassess cloud‑integrated authentication practices.

Key Takeaways

  • •CVE-2026-24858 scores 9.4, active exploitation.
  • •Affects FortiOS, FortiManager, FortiAnalyzer, FortiProxy.
  • •FortiCloud SSO auto‑enabled during FortiCare registration.
  • •Attackers gain cross‑tenant admin access with one account.
  • •Patch and disable SSO immediately to mitigate risk.

Pulse Analysis

FortiCloud Single Sign‑On was introduced to simplify credential management across Fortinet devices, but its default activation during FortiCare registration created a hidden attack surface. When SSO is enabled, the GUI’s access‑control checks fail to isolate tenant accounts, allowing a single compromised FortiCloud credential to traverse the management plane of unrelated customers. This design oversight illustrates how convenience features can inadvertently erode segmentation, especially in multi‑tenant environments where strict boundary enforcement is paramount.

Active exploitation of CVE‑2026‑24858 has already yielded tangible breaches. Threat actors have harvested configuration files for reconnaissance, then planted persistent local administrator accounts to retain footholds even after password rotations. By leveraging cloud‑side controls to block vulnerable versions, Fortinet limited further abuse, yet attackers shifted to Cloudflare‑protected IPs, highlighting the need for adaptive detection beyond static network blocks. Immediate remediation steps—applying vendor patches, disabling unnecessary SSO, restricting management interface exposure, and enforcing MFA—are essential to curtail the blast radius.

The incident reinforces a broader industry shift toward zero‑trust architectures. As network security appliances integrate more tightly with cloud identity services, organizations must treat administrative pathways as critical infrastructure, continuously verifying users, devices, and contexts. Implementing granular policy controls, continuous log monitoring, and regular penetration testing can surface similar authentication flaws before they are weaponized. Ultimately, the Fortinet SSO breach serves as a cautionary tale: convenience must be balanced with rigorous isolation to safeguard enterprise networks.

Fortinet Confirms CVE-2026-24858 SSO Flaw Under Active Attack

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...