Millions of Fortinet devices exposed in active authentication-bypass attacks

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being actively exploited, prompting urgent warnings from U.S. and industry security agencies. Researchers estimate at least 3.28 million internet-facing devices were vulnerable at the peak of exposure.

The flaw, tracked as CVE-2026-24858 and rated 9.4 out of 10 in severity, affects multiple products across Fortinet’s enterprise security portfolio, including FortiOS, FortiManager, FortiAnalyzer, FortiProxy and FortiWeb. 

The vulnerability allows attackers with a FortiCloud account and a registered device to authenticate into other organizations’ Fortinet appliances when FortiCloud single sign-on (SSO) is enabled. While the SSO feature is disabled by default, Fortinet noted that it is often turned on during FortiCare registration unless administrators explicitly opt out.

Fortinet confirmed on Jan. 22 that the flaw was being exploited in real-world attacks. The company said two malicious FortiCloud accounts were identified abusing the issue to access customer devices, download configurations and establish long-term persistence.

According to Fortinet, attackers created local administrator accounts using generic and familiar names such as “audit,” “backup,” “itadmin,” “secadmin,” “support” and “system,” making them difficult to spot during routine reviews.

The U.S. Cybersecurity and Infrastructure Security Agency, or CISA, added CVE-2026-24858 to its Known Exploited Vulnerabilities catalogue on Jan. 27, setting a remediation deadline of Jan. 30 for affected organizations.

In response to the attacks, Fortinet temporarily disabled FortiCloud SSO on Jan. 26. The service was restored the following day with new restrictions that block vulnerable devices from authenticating until they are patched.

The exposure spans a wide range of software versions. FortiOS releases from the 7.0, 7.2, 7.4 and 7.6 branches are affected, alongside comparable versions of FortiManager and FortiAnalyzer. FortiProxy and FortiWeb are also impacted across several major releases, while FortiSwitch Manager remains under investigation.

Patches are available for select branches, with Fortinet urging customers to upgrade FortiOS to versions 7.4.11 or 7.6.6, FortiManager to 7.4.10 or 7.6.6, and FortiAnalyzer to 7.2.12 or 7.0.16. Internet intelligence firm Censys said organizations unable to patch immediately should disable FortiCloud SSO as a temporary mitigation and audit all administrative accounts for suspicious users matching the attacker naming patterns.

Top Stories

Related Articles

April 22, 2026 Meta Platforms is facing a class action lawsuit in Washington, D.C., alleging the company knowingly profited from more...

April 22, 2026 Microsoft has rolled back a recent service update after it caused some users to be unable to more...

April 22, 2026 Microsoft is preparing to move GitHub Copilot to a token-based billing model, replacing its current request-based pricing more...

April 22, 2026 BlackBerry Ltd. shares rose 13 per cent after the company announced an expanded partnership with Nvidia to more...

Picture of Mary Dada

Mary Dada

Mary Dada is the associate editor for Tech Newsday, where she covers the latest innovations and happenings in the tech industry’s evolving landscape. Mary focuses on tech content writing from analyses of emerging digital trends to exploring the business side of innovation.
Picture of Mary Dada

Mary Dada

Mary Dada is the associate editor for Tech Newsday, where she covers the latest innovations and happenings in the tech industry’s evolving landscape. Mary focuses on tech content writing from analyses of emerging digital trends to exploring the business side of innovation.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn