Millions of Fortinet devices exposed in active authentication-bypass attacks

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being actively exploited, prompting urgent warnings from U.S. and industry security agencies. Researchers estimate at least 3.28 million internet-facing devices were vulnerable at the peak of exposure.

The flaw, tracked as CVE-2026-24858 and rated 9.4 out of 10 in severity, affects multiple products across Fortinet’s enterprise security portfolio, including FortiOS, FortiManager, FortiAnalyzer, FortiProxy and FortiWeb. 

The vulnerability allows attackers with a FortiCloud account and a registered device to authenticate into other organizations’ Fortinet appliances when FortiCloud single sign-on (SSO) is enabled. While the SSO feature is disabled by default, Fortinet noted that it is often turned on during FortiCare registration unless administrators explicitly opt out.

Fortinet confirmed on Jan. 22 that the flaw was being exploited in real-world attacks. The company said two malicious FortiCloud accounts were identified abusing the issue to access customer devices, download configurations and establish long-term persistence.

According to Fortinet, attackers created local administrator accounts using generic and familiar names such as “audit,” “backup,” “itadmin,” “secadmin,” “support” and “system,” making them difficult to spot during routine reviews.

The U.S. Cybersecurity and Infrastructure Security Agency, or CISA, added CVE-2026-24858 to its Known Exploited Vulnerabilities catalogue on Jan. 27, setting a remediation deadline of Jan. 30 for affected organizations.

In response to the attacks, Fortinet temporarily disabled FortiCloud SSO on Jan. 26. The service was restored the following day with new restrictions that block vulnerable devices from authenticating until they are patched.

The exposure spans a wide range of software versions. FortiOS releases from the 7.0, 7.2, 7.4 and 7.6 branches are affected, alongside comparable versions of FortiManager and FortiAnalyzer. FortiProxy and FortiWeb are also impacted across several major releases, while FortiSwitch Manager remains under investigation.

Patches are available for select branches, with Fortinet urging customers to upgrade FortiOS to versions 7.4.11 or 7.6.6, FortiManager to 7.4.10 or 7.6.6, and FortiAnalyzer to 7.2.12 or 7.0.16. Internet intelligence firm Censys said organizations unable to patch immediately should disable FortiCloud SSO as a temporary mitigation and audit all administrative accounts for suspicious users matching the attacker naming patterns.

Top Stories

Related Articles

February 4, 2026 Web hosting provider HostPapa experienced a service outage early Tuesday morning that left customer websites and dashboards more...

February 4, 2026 Global markets were jolted on Feb. 3 as fears that artificial intelligence could upend the software industry more...

February 4, 2026 OpenAI has been looking beyond Nvidia for parts of its artificial intelligence infrastructure, according to people familiar more...

February 4, 2026 A now-patched security flaw in Docker’s built-in AI assistant exposed users to the risk of remote code more...

Picture of Mary Dada

Mary Dada

Mary Dada is the associate editor for Tech Newsday, where she covers the latest innovations and happenings in the tech industry’s evolving landscape. Mary focuses on tech content writing from analyses of emerging digital trends to exploring the business side of innovation.
Picture of Mary Dada

Mary Dada

Mary Dada is the associate editor for Tech Newsday, where she covers the latest innovations and happenings in the tech industry’s evolving landscape. Mary focuses on tech content writing from analyses of emerging digital trends to exploring the business side of innovation.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn