Critical FortiCloud SSO Authentication Bypass Vulnerabilities Patched
Summary
Hide ▲
Show ▼
Fortinet has released updates to address two critical vulnerabilities (CVE-2025-59718 and CVE-2025-59719) in FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager that allow attackers to bypass FortiCloud SSO authentication via maliciously crafted SAML messages. The vulnerabilities stem from improper verification of cryptographic signatures. The FortiCloud SSO login feature is not enabled by default but is activated upon FortiCare registration unless explicitly disabled by the administrator. Threat actors have begun exploiting these vulnerabilities in active attacks on FortiGate devices, using IP addresses associated with hosting providers to carry out malicious SSO logins and export device configurations. Attackers targeted admin accounts, accessed the web management interface, and downloaded system configuration files, which can expose network layouts, internet-facing services, firewall policies, potentially vulnerable interfaces, routing tables, and hashed passwords. Over 25,000 Fortinet devices with FortiCloud SSO enabled are exposed online, with more than 5,400 in the United States and nearly 2,000 in India. Organizations are advised to apply patches immediately, disable FortiCloud SSO until updates are applied, and limit access to management interfaces. FortiOS version 7.4.10 does not fully address the authentication bypass vulnerability, and Fortinet is planning to release FortiOS 7.4.11, 7.6.6, and 8.0.0 to fully patch the security flaw. CISA has added the FortiCloud SSO auth bypass flaw to its catalog of actively exploited vulnerabilities, ordering U.S. government agencies to patch within a week by December 23rd. A new cluster of automated malicious activity began on January 15, 2026, involving unauthorized firewall configuration changes on FortiGate devices. The activity includes the creation of generic accounts for persistence, configuration changes granting VPN access, and exfiltration of firewall configurations. Malicious SSO logins were carried out against a malicious account '[email protected]' from four different IP addresses: 104.28.244.115, 104.28.212.114, 217.119.139.50, and 37.1.209.19. Threat actors created secondary accounts such as 'secadmin', 'itadmin', 'support', 'backup', 'remoteadmin', and 'audit' for persistence. All events took place within seconds of each other, indicating the possibility of automated activity. Arctic Wolf reported that the campaign started on January 15, 2026, with attackers exploiting an unknown vulnerability in the SSO feature to create accounts with VPN access and exporting firewall configurations within seconds, indicating automated activity. Arctic Wolf noted that the current campaign bears similarity to incidents documented in December following the disclosure of CVE-2025-59718. Affected admins reported that Fortinet confirmed the latest FortiOS version (7.4.10) does not fully address the authentication bypass flaw, which should have been patched since early December with the release of FortiOS 7.4.9. Fortinet is planning to release FortiOS 7.4.11, 7.6.6, and 8.0.0 over the coming days to fully address the CVE-2025-59718 security flaw. Affected Fortinet customers shared logs showing that the attackers created admin users after an SSO login from [email protected] on IP address 104.28.244.114, which matches indicators of compromise detected by Arctic Wolf. Internet security watchdog Shadowserver is currently tracking nearly 11,000 Fortinet devices that are exposed online and have FortiCloud SSO enabled. Fortinet's CISO Carl Windsor confirmed that the ongoing attacks match December's malicious activity and that the issue is applicable to all SAML SSO implementations. Fortinet advised customers to restrict administrative access to their edge network devices via the Internet by applying a local-in policy that limits the IP addresses that can access the devices' administrative interfaces. Fortinet recommended disabling the FortiCloud SSO feature on their devices by toggling off the "Allow administrative login using FortiCloud SSO" option. Affected customers are advised to treat the system and configuration as compromised, rotate credentials, and restore their configuration with a known clean version if IOCs are detected. Fortinet has confirmed a new, actively exploited critical FortiCloud SSO authentication bypass vulnerability, tracked as CVE-2026-24858. The flaw allows attackers to gain administrative access to FortiOS, FortiManager, and FortiAnalyzer devices registered to other customers, even when those devices were fully patched against a previously disclosed vulnerability. Fortinet has mitigated the zero-day attacks by blocking FortiCloud SSO connections from devices running vulnerable firmware versions. Fortinet confirmed that attackers were exploiting an alternate authentication path that remained even on fully patched systems. Fortinet disabled FortiCloud accounts being abused by attackers on January 22 and disabled FortiCloud SSO globally on January 26. Fortinet restored FortiCloud SSO access on January 27 but restricted it so that devices running vulnerable firmware can no longer authenticate via SSO. The vulnerability is "Authentication Bypass Using an Alternate Path or Channel," caused by improper access control in FortiCloud SSO. Attackers with a FortiCloud account and a registered device could authenticate to other customers' devices if FortiCloud SSO was enabled. Fortinet confirmed the vulnerability was exploited in the wild by the malicious FortiCloud SSO accounts '[email protected]' and '[email protected]'. Once a device was breached, attackers would download customer config files and create one of the following admin accounts: audit, backup, itadmin, secadmin, support, backupadmin, deploy, remoteadmin, security, svcadmin, system. Connections were made from the following IP addresses: 104.28.244.115, 104.28.212.114, 104.28.212.115, 104.28.195.105, 104.28.195.106, 104.28.227.106, 104.28.227.105, 104.28.244.114, 37.1.209.19, 217.119.139.50. Fortinet is still investigating whether FortiWeb and FortiSwitch Manager are affected by the flaw. Customers who detect indicators of compromise in their logs should treat their devices as fully compromised, review all administrator accounts, restore configurations from known-clean backups, and rotate all credentials.
Timeline
-
28.01.2026 10:05 1 articles · 23h ago
Fortinet releases patches for CVE-2026-24858
Fortinet has released emergency patches for a new FortiCloud SSO authentication bypass vulnerability, tracked as CVE-2026-24858, which has been exploited in the wild as a zero-day. The exploitation of CVE-2026-24858 was discovered after Arctic Wolf observed automated attacks targeting FortiGate firewalls to create new administrator accounts and exfiltrate configuration files. Fortinet confirmed that the attacks were exploiting devices fully patched against CVE-2025-59718 and CVE-2025-59719, two critical-severity FortiCloud SSO login bugs patched in early December. CVE-2026-24858 allows an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts if FortiCloud SSO authentication is enabled. Fortinet blocked the malicious FortiCloud accounts used in the zero-day attacks observed earlier this month and briefly disabled FortiCloud SSO on the FortiCloud side between January 26 and 27. FortiCloud SSO no longer supports login from devices running vulnerable versions, meaning that users need to apply the newly released patches to benefit from FortiCloud SSO authentication. The patches were included in FortiAnalyzer version 7.4.10, FortiManager version 7.4.10, and FortiOS version 7.4.11. The patches will also be included in FortiAnalyzer versions 7.6.6, 7.2.12, and 7.0.16, FortiManager versions 7.6.6, 7.2.13, and 7.0.16, FortiOS versions 7.6.6, 7.2.13, and 7.0.19, and FortiProxy versions 7.6.6 and 7.4.13. The US cybersecurity agency CISA added CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies to patch it by January 30.
Show sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
28.01.2026 01:19 3 articles · 1d ago
Fortinet confirms new critical FortiCloud SSO authentication bypass vulnerability CVE-2026-24858
Fortinet has confirmed a new, actively exploited critical FortiCloud SSO authentication bypass vulnerability, tracked as CVE-2026-24858. The flaw allows attackers to gain administrative access to FortiOS, FortiManager, and FortiAnalyzer devices registered to other customers, even when those devices were fully patched against a previously disclosed vulnerability. Fortinet has mitigated the zero-day attacks by blocking FortiCloud SSO connections from devices running vulnerable firmware versions. Fortinet confirmed that attackers were exploiting an alternate authentication path that remained even on fully patched systems. Fortinet disabled FortiCloud accounts being abused by attackers on January 22 and disabled FortiCloud SSO globally on January 26. Fortinet restored FortiCloud SSO access on January 27 but restricted it so that devices running vulnerable firmware can no longer authenticate via SSO. The vulnerability is "Authentication Bypass Using an Alternate Path or Channel," caused by improper access control in FortiCloud SSO. Attackers with a FortiCloud account and a registered device could authenticate to other customers' devices if FortiCloud SSO was enabled. Fortinet confirmed the vulnerability was exploited in the wild by the malicious FortiCloud SSO accounts '[email protected]' and '[email protected]'. Once a device was breached, attackers would download customer config files and create one of the following admin accounts: audit, backup, itadmin, secadmin, support, backupadmin, deploy, remoteadmin, security, svcadmin, system. Connections were made from the following IP addresses: 104.28.244.115, 104.28.212.114, 104.28.212.115, 104.28.195.105, 104.28.195.106, 104.28.227.106, 104.28.227.105, 104.28.244.114, 37.1.209.19, 217.119.139.50. Fortinet is still investigating whether FortiWeb and FortiSwitch Manager are affected by the flaw. Customers who detect indicators of compromise in their logs should treat their devices as fully compromised, review all administrator accounts, restore configurations from known-clean backups, and rotate all credentials.
Show sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
22.01.2026 07:55 8 articles · 7d ago
New automated attacks alter firewall configurations on FortiGate devices
A new cluster of automated malicious activity began on January 15, 2026, involving unauthorized firewall configuration changes on FortiGate devices. The activity includes the creation of generic accounts for persistence, configuration changes granting VPN access, and exfiltration of firewall configurations. Malicious SSO logins were carried out against a malicious account '[email protected]' from four different IP addresses: 104.28.244.115, 104.28.212.114, 217.119.139.50, and 37.1.209.19. Threat actors created secondary accounts such as 'secadmin', 'itadmin', 'support', 'backup', 'remoteadmin', and 'audit' for persistence. All events took place within seconds of each other, indicating the possibility of automated activity. Arctic Wolf reported that the campaign started on January 15, 2026, with attackers exploiting an unknown vulnerability in the SSO feature to create accounts with VPN access and exporting firewall configurations within seconds, indicating automated activity. Arctic Wolf noted that the current campaign bears similarity to incidents documented in December following the disclosure of CVE-2025-59718. The attacks originated from a small number of hosting providers and typically targeted the [email protected] account. Within seconds after login, the attackers exported device configurations, likely through automation. It is unclear whether the activity is fully covered by the patch that initially addressed CVE-2025-59718 and CVE-2025-59719. The recent exploitation activity involves the creation of generic accounts for persistence, making configuration changes to grant VPN access, and exfiltrating firewall configurations. The threat actors have been observed logging in with accounts named '[email protected]' and '[email protected]'.
Show sources
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
19.12.2025 17:00 6 articles · 1mo ago
Over 25,000 Fortinet devices exposed to FortiCloud SSO attacks
Over 25,000 Fortinet devices with FortiCloud SSO enabled are exposed online, with more than 5,400 in the United States and nearly 2,000 in India. Shadowserver and Macnica threat researcher Yutaka Sejiyama have identified these devices, highlighting the widespread exposure. CISA has added the vulnerability to its catalog of actively exploited vulnerabilities, mandating U.S. government agencies to patch by December 23rd. Internet security watchdog Shadowserver is currently tracking nearly 11,000 Fortinet devices that are exposed online and have FortiCloud SSO enabled.
Show sources
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
16.12.2025 12:58 12 articles · 1mo ago
Active exploitation of FortiCloud SSO authentication bypass vulnerabilities
Threat actors have begun exploiting CVE-2025-59718 and CVE-2025-59719 in active attacks on FortiGate devices. Attackers used IP addresses associated with hosting providers like The Constant Company llc, Bl Networks, and Kaopu Cloud Hk Limited to carry out malicious SSO logins and export device configurations. Attackers targeted admin accounts, accessed the web management interface, and downloaded system configuration files, which can expose network layouts, internet-facing services, firewall policies, potentially vulnerable interfaces, routing tables, and hashed passwords. Recent reports indicate that attackers have exploited the vulnerability via maliciously crafted SAML messages to compromise admin accounts, creating new admin users such as 'helpdesk'. The IP address 104.28.244.114 has been used in recent exploitation attempts. A new cluster of automated malicious activity began on January 15, 2026, involving unauthorized firewall configuration changes on FortiGate devices. The activity includes the creation of generic accounts for persistence, configuration changes granting VPN access, and exfiltration of firewall configurations. Malicious SSO logins were carried out against a malicious account '[email protected]' from four different IP addresses: 104.28.244.115, 104.28.212.114, 217.119.139.50, and 37.1.209.19. Threat actors created secondary accounts such as 'secadmin', 'itadmin', 'support', 'backup', 'remoteadmin', and 'audit' for persistence. All events took place within seconds of each other, indicating the possibility of automated activity. Arctic Wolf reported that the campaign started on January 15, 2026, with attackers exploiting an unknown vulnerability in the SSO feature to create accounts with VPN access and exporting firewall configurations within seconds, indicating automated activity. Arctic Wolf noted that the current campaign bears similarity to incidents documented in December following the disclosure of CVE-2025-59718. Affected Fortinet customers shared logs showing that the attackers created admin users after an SSO login from [email protected] on IP address 104.28.244.114, which matches indicators of compromise detected by Arctic Wolf. The recent exploitation activity involves the creation of generic accounts for persistence, making configuration changes to grant VPN access, and exfiltrating firewall configurations. The threat actors have been observed logging in with accounts named '[email protected]' and '[email protected]'.
Show sources
- Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass — thehackernews.com — 16.12.2025 12:58
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
09.12.2025 20:36 12 articles · 1mo ago
Fortinet patches critical FortiCloud SSO authentication bypass vulnerabilities
Fortinet has released updates to address two critical vulnerabilities (CVE-2025-59718 and CVE-2025-59719) in FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager that allow attackers to bypass FortiCloud SSO authentication via maliciously crafted SAML messages. The vulnerabilities stem from improper verification of cryptographic signatures. The FortiCloud SSO login feature is not enabled by default but is activated upon FortiCare registration unless explicitly disabled by the administrator. However, FortiOS version 7.4.10 does not fully address the authentication bypass vulnerability, and Fortinet is planning to release FortiOS 7.4.11, 7.6.6, and 8.0.0 to fully patch the security flaw. Multiple users reported seeing malicious SSO logins on fully-patched FortiOS devices, with the Fortinet developer team confirming the vulnerability persists in version 7.4.10. Affected admins reported that Fortinet confirmed the latest FortiOS version (7.4.10) does not fully address the authentication bypass flaw, which should have been patched since early December with the release of FortiOS 7.4.9. Fortinet is planning to release FortiOS 7.4.11, 7.6.6, and 8.0.0 over the coming days to fully address the CVE-2025-59718 security flaw. Fortinet's CISO Carl Windsor confirmed that the ongoing attacks match December's malicious activity and that the issue is applicable to all SAML SSO implementations. Fortinet advised customers to restrict administrative access to their edge network devices via the Internet by applying a local-in policy that limits the IP addresses that can access the devices' administrative interfaces. Fortinet recommended disabling the FortiCloud SSO feature on their devices by toggling off the "Allow administrative login using FortiCloud SSO" option. Affected customers are advised to treat the system and configuration as compromised, rotate credentials, and restore their configuration with a known clean version if IOCs are detected. Fortinet has confirmed that the FortiCloud SSO authentication bypass vulnerability is still being actively exploited on fully-patched FortiGate firewalls. The recent exploitation activity involves the creation of generic accounts for persistence, making configuration changes to grant VPN access, and exfiltrating firewall configurations. The threat actors have been observed logging in with accounts named '[email protected]' and '[email protected]'. Fortinet has advised restricting administrative access to edge network devices via the internet by applying a local-in policy and disabling FortiCloud SSO logins by disabling the 'admin-forticloud-sso-login' option.
Show sources
- Fortinet warns of critical FortiCloud SSO login auth bypass flaws — www.bleepingcomputer.com — 09.12.2025 20:36
- Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass — thehackernews.com — 16.12.2025 12:58
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
Information Snippets
-
CVE-2025-59718 and CVE-2025-59719 are critical vulnerabilities affecting FortiOS, FortiProxy, FortiSwitchManager, and FortiWeb, enabling authentication bypass via malformed SAML messages.
First reported: 09.12.2025 20:363 sources, 12 articlesShow sources
- Fortinet warns of critical FortiCloud SSO login auth bypass flaws — www.bleepingcomputer.com — 09.12.2025 20:36
- Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass — thehackernews.com — 16.12.2025 12:58
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
The FortiCloud SSO login feature is disabled by default but is enabled upon FortiCare registration unless manually disabled.
First reported: 09.12.2025 20:363 sources, 13 articlesShow sources
- Fortinet warns of critical FortiCloud SSO login auth bypass flaws — www.bleepingcomputer.com — 09.12.2025 20:36
- Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass — thehackernews.com — 16.12.2025 12:58
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
CVE-2025-59808 allows attackers to reset account credentials without password prompts, while CVE-2025-64471 enables authentication using password hashes.
First reported: 09.12.2025 20:362 sources, 2 articlesShow sources
- Fortinet warns of critical FortiCloud SSO login auth bypass flaws — www.bleepingcomputer.com — 09.12.2025 20:36
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Fortinet vulnerabilities are frequently exploited in ransomware and cyber-espionage attacks, including recent incidents involving the Volt Typhoon hacking group.
First reported: 09.12.2025 20:362 sources, 3 articlesShow sources
- Fortinet warns of critical FortiCloud SSO login auth bypass flaws — www.bleepingcomputer.com — 09.12.2025 20:36
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Threat actors have begun exploiting CVE-2025-59718 and CVE-2025-59719 in active attacks on FortiGate devices.
First reported: 16.12.2025 12:583 sources, 7 articlesShow sources
- Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass — thehackernews.com — 16.12.2025 12:58
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Attackers used IP addresses associated with hosting providers like The Constant Company llc, Bl Networks, and Kaopu Cloud Hk Limited.
First reported: 16.12.2025 12:583 sources, 8 articlesShow sources
- Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass — thehackernews.com — 16.12.2025 12:58
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Attackers exported device configurations via the GUI to the same IP addresses used for malicious SSO logins.
First reported: 16.12.2025 12:582 sources, 5 articlesShow sources
- Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass — thehackernews.com — 16.12.2025 12:58
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Organizations are advised to disable FortiCloud SSO until patches are applied and limit access to management interfaces.
First reported: 16.12.2025 12:582 sources, 4 articlesShow sources
- Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass — thehackernews.com — 16.12.2025 12:58
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
CVE-2025-59718 and CVE-2025-59719 are exploitable if FortiCloud SSO is enabled, which is not the default setting but is activated automatically upon FortiCare registration unless explicitly disabled.
First reported: 16.12.2025 17:572 sources, 5 articlesShow sources
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Attackers targeted admin accounts with malicious SSO logins and accessed the web management interface to download system configuration files.
First reported: 16.12.2025 17:573 sources, 10 articlesShow sources
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Configuration files can expose network layouts, internet-facing services, firewall policies, potentially vulnerable interfaces, routing tables, and hashed passwords.
First reported: 16.12.2025 17:573 sources, 8 articlesShow sources
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
The exfiltration of configuration files suggests that the activity is part of a malicious operation that may support future attacks.
First reported: 16.12.2025 17:572 sources, 7 articlesShow sources
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
The vulnerabilities impact multiple versions of Fortinet products except for FortiOS 6.4, FortiWeb 7.0, and FortiWeb 7.2.
First reported: 16.12.2025 17:573 sources, 4 articlesShow sources
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Fortinet recommends disabling the FortiCloud login feature until an upgrade to a safer version is possible.
First reported: 16.12.2025 17:573 sources, 6 articlesShow sources
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
System administrators are advised to move to specific patched versions of FortiOS, FortiProxy, FortiSwitchManager, and FortiWeb to address the vulnerabilities.
First reported: 16.12.2025 17:572 sources, 5 articlesShow sources
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
If any signs of compromise are discovered, it is recommended to rotate firewall credentials and limit firewall/VPN management access to trusted internal networks only.
First reported: 16.12.2025 17:573 sources, 5 articlesShow sources
- Hackers exploit newly patched Fortinet auth bypass flaws — www.bleepingcomputer.com — 16.12.2025 17:57
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Over 25,000 Fortinet devices with FortiCloud SSO enabled are exposed online.
First reported: 19.12.2025 17:003 sources, 5 articlesShow sources
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Shadowserver is tracking over 25,000 IP addresses with a FortiCloud SSO fingerprint, with more than 5,400 in the United States and nearly 2,000 in India.
First reported: 19.12.2025 17:003 sources, 5 articlesShow sources
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Macnica threat researcher Yutaka Sejiyama found over 30,000 Fortinet devices with FortiCloud SSO enabled, exposing vulnerable web management interfaces to the internet.
First reported: 19.12.2025 17:003 sources, 5 articlesShow sources
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
CISA added the FortiCloud SSO auth bypass flaw to its catalog of actively exploited vulnerabilities, ordering U.S. government agencies to patch within a week by December 23rd.
First reported: 19.12.2025 17:002 sources, 4 articlesShow sources
- Over 25,000 FortiCloud SSO devices exposed to remote attacks — www.bleepingcomputer.com — 19.12.2025 17:00
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
FortiOS version 7.4.10 does not fully address the authentication bypass vulnerability, which was supposed to be patched in FortiOS 7.4.9.
First reported: 21.01.2026 19:493 sources, 7 articlesShow sources
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Fortinet is planning to release FortiOS 7.4.11, 7.6.6, and 8.0.0 to fully patch the security flaw.
First reported: 21.01.2026 19:493 sources, 7 articlesShow sources
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Attackers have exploited the vulnerability via maliciously crafted SAML messages to compromise admin accounts, creating new admin users such as 'helpdesk'.
First reported: 21.01.2026 19:493 sources, 7 articlesShow sources
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
The IP address 104.28.244.114 has been used in recent exploitation attempts.
First reported: 21.01.2026 19:493 sources, 7 articlesShow sources
- Fortinet admins report patched FortiGate firewalls getting hacked — www.bleepingcomputer.com — 21.01.2026 19:49
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
A new cluster of automated malicious activity began on January 15, 2026, involving unauthorized firewall configuration changes on FortiGate devices.
First reported: 22.01.2026 07:553 sources, 6 articlesShow sources
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
The activity includes the creation of generic accounts for persistence, configuration changes granting VPN access, and exfiltration of firewall configurations.
First reported: 22.01.2026 07:553 sources, 7 articlesShow sources
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Malicious SSO logins were carried out against a malicious account '[email protected]' from four different IP addresses: 104.28.244.115, 104.28.212.114, 217.119.139.50, and 37.1.209.19.
First reported: 22.01.2026 07:553 sources, 7 articlesShow sources
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Threat actors created secondary accounts such as 'secadmin', 'itadmin', 'support', 'backup', 'remoteadmin', and 'audit' for persistence.
First reported: 22.01.2026 07:553 sources, 7 articlesShow sources
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
All events took place within seconds of each other, indicating the possibility of automated activity.
First reported: 22.01.2026 07:553 sources, 7 articlesShow sources
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Multiple users reported seeing malicious SSO logins on fully-patched FortiOS devices, with the Fortinet developer team confirming the vulnerability persists in version 7.4.10.
First reported: 22.01.2026 07:553 sources, 6 articlesShow sources
- Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations — thehackernews.com — 22.01.2026 07:55
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Arctic Wolf reported that the campaign started on January 15, 2026, with attackers exploiting an unknown vulnerability in the SSO feature to create accounts with VPN access and exporting firewall configurations within seconds, indicating automated activity.
First reported: 22.01.2026 13:493 sources, 6 articlesShow sources
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Arctic Wolf noted that the current campaign bears similarity to incidents documented in December following the disclosure of CVE-2025-59718.
First reported: 22.01.2026 13:493 sources, 6 articlesShow sources
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Affected admins reported that Fortinet confirmed the latest FortiOS version (7.4.10) does not fully address the authentication bypass flaw, which should have been patched since early December with the release of FortiOS 7.4.9.
First reported: 22.01.2026 13:493 sources, 6 articlesShow sources
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Fortinet is planning to release FortiOS 7.4.11, 7.6.6, and 8.0.0 over the coming days to fully address the CVE-2025-59718 security flaw.
First reported: 22.01.2026 13:493 sources, 6 articlesShow sources
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Affected Fortinet customers shared logs showing that the attackers created admin users after an SSO login from [email protected] on IP address 104.28.244.114, which matches indicators of compromise detected by Arctic Wolf.
First reported: 22.01.2026 13:493 sources, 6 articlesShow sources
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Internet security watchdog Shadowserver is currently tracking nearly 11,000 Fortinet devices that are exposed online and have FortiCloud SSO enabled.
First reported: 22.01.2026 13:493 sources, 5 articlesShow sources
- Hackers breach Fortinet FortiGate devices, steal firewall configs — www.bleepingcomputer.com — 22.01.2026 13:49
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Threat actors have been observed making configuration changes to FortiGate firewalls in a new wave of attacks similar to a December 2025 campaign.
First reported: 22.01.2026 14:103 sources, 4 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Arctic Wolf observed automated attacks targeting FortiGate devices to create new user accounts, modify configurations for VPN access, and exfiltrate firewall data.
First reported: 22.01.2026 14:103 sources, 4 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
The activity is similar to a month-old campaign targeting CVE-2025-59718 and CVE-2025-59719, two critical-severity authentication bypass vulnerabilities in Fortinet products.
First reported: 22.01.2026 14:103 sources, 4 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
The bugs allow attackers to bypass the FortiCloud SSO login authentication via crafted SAML response messages.
First reported: 22.01.2026 14:103 sources, 3 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
The FortiCloud login feature is disabled by default but is enabled when registering a new device to FortiCare from the device’s UI, unless the administrator specifically disables it.
First reported: 22.01.2026 14:103 sources, 3 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Arctic Wolf warned that threat actors started exploiting the security defects against FortiGate firewalls three days after Fortinet announced patches for the two issues.
First reported: 22.01.2026 14:102 sources, 2 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Arctic Wolf has observed a new wave of malicious SSO logins on FortiGate appliances resulting in malicious configuration changes.
First reported: 22.01.2026 14:103 sources, 3 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
The attacks originated from a small number of hosting providers and typically targeted the [email protected] account.
First reported: 22.01.2026 14:103 sources, 4 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Within seconds after login, the attackers exported device configurations, likely through automation.
First reported: 22.01.2026 14:103 sources, 5 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
It is unclear whether the activity is fully covered by the patch that initially addressed CVE-2025-59718 and CVE-2025-59719.
First reported: 22.01.2026 14:103 sources, 5 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Users on Reddit suggest that the December patches for the two Fortinet vulnerabilities were not complete, and that the vendor is working on fresh fixes for the bugs.
First reported: 22.01.2026 14:103 sources, 4 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
To prevent the exploitation of the two vulnerabilities, users are advised to disable the FortiCloud login feature by going to the settings menu and switching 'Allow administrative login using FortiCloud SSO' off.
First reported: 22.01.2026 14:103 sources, 4 articlesShow sources
- New Wave of Attacks Targeting FortiGate Firewalls — www.securityweek.com — 22.01.2026 14:10
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Fortinet confirmed that the CVE-2025-59718 vulnerability is not fully patched and is working on a fix.
First reported: 23.01.2026 12:392 sources, 3 articlesShow sources
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
-
Fortinet's CISO Carl Windsor stated that the ongoing attacks match December's malicious activity and that the issue is applicable to all SAML SSO implementations.
First reported: 23.01.2026 12:393 sources, 5 articlesShow sources
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet advised customers to restrict administrative access to their edge network devices via the Internet by applying a local-in policy that limits the IP addresses that can access the devices' administrative interfaces.
First reported: 23.01.2026 12:393 sources, 5 articlesShow sources
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet recommended disabling the FortiCloud SSO feature on their devices by toggling off the "Allow administrative login using FortiCloud SSO" option.
First reported: 23.01.2026 12:393 sources, 5 articlesShow sources
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Affected customers are advised to treat the system and configuration as compromised, rotate credentials, and restore their configuration with a known clean version if IOCs are detected.
First reported: 23.01.2026 12:393 sources, 5 articlesShow sources
- Fortinet confirms critical FortiCloud auth bypass not fully patched — www.bleepingcomputer.com — 23.01.2026 12:39
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet has confirmed that the FortiCloud SSO authentication bypass vulnerability is still being actively exploited on fully-patched FortiGate firewalls.
First reported: 23.01.2026 14:303 sources, 4 articlesShow sources
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The recent exploitation activity involves the creation of generic accounts for persistence, making configuration changes to grant VPN access, and exfiltrating firewall configurations.
First reported: 23.01.2026 14:303 sources, 4 articlesShow sources
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The threat actors have been observed logging in with accounts named '[email protected]' and '[email protected]'.
First reported: 23.01.2026 14:303 sources, 4 articlesShow sources
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet has advised restricting administrative access to edge network devices via the internet by applying a local-in policy.
First reported: 23.01.2026 14:303 sources, 4 articlesShow sources
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet has recommended disabling FortiCloud SSO logins by disabling the 'admin-forticloud-sso-login' option.
First reported: 23.01.2026 14:303 sources, 4 articlesShow sources
- Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls — thehackernews.com — 23.01.2026 14:30
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
A new critical FortiCloud SSO authentication bypass vulnerability, tracked as CVE-2026-24858, has been actively exploited.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet has mitigated the zero-day attacks by blocking FortiCloud SSO connections from devices running vulnerable firmware versions.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The flaw allows attackers to gain administrative access to FortiOS, FortiManager, and FortiAnalyzer devices registered to other customers, even when those devices were fully patched against a previously disclosed vulnerability.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet confirmed that attackers were exploiting an alternate authentication path that remained even on fully patched systems.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet disabled FortiCloud accounts being abused by attackers on January 22 and disabled FortiCloud SSO globally on January 26.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet restored FortiCloud SSO access on January 27 but restricted it so that devices running vulnerable firmware can no longer authenticate via SSO.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The vulnerability is "Authentication Bypass Using an Alternate Path or Channel," caused by improper access control in FortiCloud SSO.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Attackers with a FortiCloud account and a registered device could authenticate to other customers' devices if FortiCloud SSO was enabled.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet confirmed the vulnerability was exploited in the wild by the malicious FortiCloud SSO accounts '[email protected]' and '[email protected]'.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Once a device was breached, attackers would download customer config files and create one of the following admin accounts: audit, backup, itadmin, secadmin, support, backupadmin, deploy, remoteadmin, security, svcadmin, system.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Connections were made from the following IP addresses: 104.28.244.115, 104.28.212.114, 104.28.212.115, 104.28.195.105, 104.28.195.106, 104.28.227.106, 104.28.227.105, 104.28.244.114, 37.1.209.19, 217.119.139.50.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet is still investigating whether FortiWeb and FortiSwitch Manager are affected by the flaw.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Customers who detect indicators of compromise in their logs should treat their devices as fully compromised, review all administrator accounts, restore configurations from known-clean backups, and rotate all credentials.
First reported: 28.01.2026 01:193 sources, 3 articlesShow sources
- Fortinet blocks exploited FortiCloud SSO zero day until patch is ready — www.bleepingcomputer.com — 28.01.2026 01:19
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet has begun releasing security updates to address CVE-2026-24858, a critical flaw impacting FortiOS, FortiManager, and FortiAnalyzer.
First reported: 28.01.2026 06:492 sources, 2 articlesShow sources
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The vulnerability allows attackers with a FortiCloud account and a registered device to log into other devices registered to other accounts if FortiCloud SSO authentication is enabled.
First reported: 28.01.2026 06:492 sources, 2 articlesShow sources
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet is continuing to investigate if other products, including FortiWeb and FortiSwitch Manager, are impacted by the flaw.
First reported: 28.01.2026 06:492 sources, 2 articlesShow sources
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet has taken steps to mitigate the zero-day attacks by blocking FortiCloud SSO connections from devices running vulnerable firmware versions.
First reported: 28.01.2026 06:492 sources, 2 articlesShow sources
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet has locked out two malicious FortiCloud accounts ([email protected] and [email protected]) on January 22, 2026.
First reported: 28.01.2026 06:492 sources, 2 articlesShow sources
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet disabled FortiCloud SSO on the FortiCloud side on January 26, 2026.
First reported: 28.01.2026 06:492 sources, 2 articlesShow sources
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet re-enabled FortiCloud SSO on January 27, 2026, but disabled the option to login from devices running vulnerable versions.
First reported: 28.01.2026 06:492 sources, 2 articlesShow sources
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Customers are required to upgrade to the latest versions of the software for the FortiCloud SSO authentication to function.
First reported: 28.01.2026 06:492 sources, 2 articlesShow sources
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to remediate the issues by January 30, 2026.
First reported: 28.01.2026 06:492 sources, 2 articlesShow sources
- Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected — thehackernews.com — 28.01.2026 06:49
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet has released emergency patches for a new FortiCloud SSO authentication bypass vulnerability, tracked as CVE-2026-24858, which has been exploited in the wild as a zero-day.
First reported: 28.01.2026 10:051 source, 1 articleShow sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The exploitation of CVE-2026-24858 was discovered after Arctic Wolf observed automated attacks targeting FortiGate firewalls to create new administrator accounts and exfiltrate configuration files.
First reported: 28.01.2026 10:051 source, 1 articleShow sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet confirmed that the attacks were exploiting devices fully patched against CVE-2025-59718 and CVE-2025-59719, two critical-severity FortiCloud SSO login bugs patched in early December.
First reported: 28.01.2026 10:051 source, 1 articleShow sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
CVE-2026-24858 allows an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts if FortiCloud SSO authentication is enabled.
First reported: 28.01.2026 10:051 source, 1 articleShow sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
Fortinet blocked the malicious FortiCloud accounts used in the zero-day attacks observed earlier this month and briefly disabled FortiCloud SSO on the FortiCloud side between January 26 and 27.
First reported: 28.01.2026 10:051 source, 1 articleShow sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
FortiCloud SSO no longer supports login from devices running vulnerable versions, meaning that users need to apply the newly released patches to benefit from FortiCloud SSO authentication.
First reported: 28.01.2026 10:051 source, 1 articleShow sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The patches were included in FortiAnalyzer version 7.4.10, FortiManager version 7.4.10, and FortiOS version 7.4.11.
First reported: 28.01.2026 10:051 source, 1 articleShow sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The patches will also be included in FortiAnalyzer versions 7.6.6, 7.2.12, and 7.0.16, FortiManager versions 7.6.6, 7.2.13, and 7.0.16, FortiOS versions 7.6.6, 7.2.13, and 7.0.19, and FortiProxy versions 7.6.6 and 7.4.13.
First reported: 28.01.2026 10:051 source, 1 articleShow sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
-
The US cybersecurity agency CISA added CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies to patch it by January 30.
First reported: 28.01.2026 10:051 source, 1 articleShow sources
- Fortinet Patches Exploited FortiCloud SSO Authentication Bypass — www.securityweek.com — 28.01.2026 10:05
Similar Happenings
Fortinet Firewalls Exploited via Incompletely Patched Flaws
Fortinet confirmed ongoing exploitation of an improperly patched vulnerability in FortiCloud SSO authentication, affecting fully updated firewalls. The flaw, related to CVE-2025-59718 and CVE-2025-59719, allows unauthenticated bypass of SSO login via crafted SAML messages. Fortinet advises disabling FortiCloud SSO and restricting administrative access as mitigations. The vulnerability highlights the risks of incomplete patches and the evolving tactics of attackers targeting trusted network security tools.
Critical Fortinet FortiSIEM Flaw Exploited in the Wild
A critical vulnerability in Fortinet FortiSIEM (CVE-2025-64155, CVSS 9.4) is under active exploitation. The flaw allows unauthenticated attackers to execute arbitrary code or commands via crafted TCP requests. The vulnerability comprises two issues: an unauthenticated argument injection leading to arbitrary file write and remote code execution as the admin user, and a file overwrite privilege escalation leading to root access. The affected phMonitor service is deeply embedded in FortiSIEM's operational workflow, making successful exploitation grant full control of the appliance. This vulnerability poses a significant risk to organizations using FortiSIEM, as it can lead to complete compromise of the appliance. Fortinet users are advised to apply patches and monitor their systems for any signs of exploitation.
Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability (CVE-2020-12812)
Fortinet has reported active exploitation of a five-year-old vulnerability (CVE-2020-12812) in FortiOS SSL VPN, which allows attackers to bypass two-factor authentication (2FA) under specific configurations. The flaw, affecting certain setups with local and remote authentication methods, has been observed in the wild by multiple threat actors, including state-backed hackers. Fortinet has issued an advisory detailing the prerequisites for exploitation and recommended mitigations. The FBI and CISA have also warned about the exploitation of this vulnerability in ransomware attacks.
Active Exploitation of Critical WatchGuard Fireware OS VPN Vulnerability (CVE-2025-14733)
WatchGuard has released patches for a critical out-of-bounds write vulnerability (CVE-2025-14733, CVSS 9.3) in Fireware OS, which is being actively exploited in the wild. The flaw affects the iked process and could allow remote unauthenticated attackers to execute arbitrary code. The vulnerability impacts various versions of Fireware OS, including 2025.1, 12.x, 12.5.x, and 12.3.1, while versions 11.x are end-of-life. WatchGuard has observed active exploitation attempts from several IP addresses, some of which are linked to recent Fortinet vulnerabilities. The company has provided indicators of compromise (IoCs) and temporary mitigation steps for affected devices.
Active Exploitation of Unpatched Cisco AsyncOS Zero-Day in SEG and SEWM Appliances
Cisco has identified an unpatched, critical zero-day vulnerability (CVE-2025-20393) in AsyncOS, affecting Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances. The flaw is actively exploited by a Chinese threat group, UAT-9686, to deploy backdoors and other malware. The attacks have been ongoing since at least late November 2025. Cisco has released security updates for the vulnerability and recommends securing and restricting access to vulnerable appliances. The vulnerability allows threat actors to execute arbitrary commands with root privileges and deploy tools like AquaShell, AquaTunnel, Chisel, and AquaPurge. CISA has added CVE-2025-20393 to its Known Exploited Vulnerabilities (KEV) catalog, requiring FCEB agencies to apply mitigations by December 24, 2025. Additionally, GreyNoise detected a coordinated campaign targeting enterprise VPN infrastructure, including Cisco SSL VPN and Palo Alto Networks GlobalProtect portals.