Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是Fortinet发现了一个严重的安全漏洞,CVE编号是CVE-2026-24858,CVSS评分9.4分。这个漏洞涉及到身份验证绕过,特别是在FortiOS的单点登录(SSO)功能中。受影响的产品包括FortiManager和FortiAnalyzer,可能还有其他产品如FortiWeb和FortiSwitch Manager。 攻击者利用这个漏洞,通过FortiCloud账户和已注册设备,可以登录到其他账户下的设备。默认情况下,FortiCloud SSO是关闭的,只有在管理员手动开启后才会启用。最近 Fortinet 已经采取措施封锁恶意账户,并禁用了SSO功能,然后又重新启用了它,但要求用户升级到最新版本才能使用。 此外,CISA已经将这个漏洞加入到已知被利用的漏洞目录中,并要求联邦机构在1月30日前修复问题。用户需要采取措施升级固件、恢复配置、轮换凭证等。 现在我要把这些信息浓缩到100字以内。重点包括:Fortinet修复了关键漏洞CVE-2026-24858;影响多个产品;攻击者可绕过身份验证;默认关闭SSO; Fortinet已采取措施;CISA要求修复;用户需升级和采取安全措施。 这样组织起来应该符合要求。 </think> Fortinet修复了影响FortiOS、FortiManager和FortiAnalyzer的严重漏洞CVE-2026-24858(CVSS 9.4),该漏洞允许攻击者绕过身份验证并登录其他设备。默认情况下,FortiCloud SSO未启用。 Fortinet已封锁恶意账户并限制旧版本设备登录。CISA要求联邦机构于1月30日前修复该漏洞。用户需升级固件、恢复配置并轮换凭证以应对潜在威胁。 2026-1-28 04:49:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Network Security / Zero-Day

Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild.

The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS score: 9.4), has been described as an authentication bypass related to FortiOS single sign-on (SSO). The flaw also affects FortiManager and FortiAnalyzer. The company said it's continuing to investigate if other products, including FortiWeb and FortiSwitch Manager, are impacted by the flaw.

"An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS, FortiManager, FortiAnalyzer may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices," Fortinet said in an advisory released Tuesday.

It's worth noting that the FortiCloud SSO login feature is not enabled in the default factory settings. It's only turned on in scenarios where an administrator registers the device to FortiCare from the device's GUI, unless they have taken steps to explicitly toggle the "Allow administrative login using FortiCloud SSO" switch.

The development comes days after Fortinet confirmed that unidentified threat actors were abusing a "new attack path" to achieve SSO logins without requiring any authentication. The access was abused to create local admin accounts for persistence, make configuration changes granting VPN access to those accounts, and exfiltrate those firewall configurations.

Cybersecurity

Over the past week, the network security vendor said it has taken the following steps -

  • Locked out two malicious FortiCloud accounts ([email protected] and [email protected]) on January 22, 2026
  • Disabled FortiCloud SSO on the FortiCloud side on January 26, 2026
  • Re-enabled FortiCloud SSO on January 27, 2026, but disabling the option to login from devices running vulnerable versions

In other words, customers are required to upgrade to the latest versions of the software for the FortiCloud SSO authentication to function. Fortinet is also urging users who detect signs of compromise to treat their devices as breached and recommends the following actions -

  • Ensure the device is running the latest firmware version
  • Restore configuration with a known clean version or audit for any unauthorized changes
  • Rotate credentials, including any LDAP/AD accounts that may be connected to the FortiGate devices

The development has led the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to remediate the issues by January 30, 2026.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html
如有侵权请联系:admin#unsafe.sh