Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Use Amazon MSK Connect and Iceberg Kafka Connect to build a real-time data lake

    February 5, 2026

    Detecting backdoored language models at scale

    February 4, 2026

    Piezotronic-probe modulates piezoelectric-electric-thermal coupling field in GaN power electronics

    February 4, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
    IT/ Cybersecurity

    Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

    big tee tech hubBy big tee tech hubJanuary 28, 2026023 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Ravie LakshmananJan 28, 2026Network Security / Zero-Day

    Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

    Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild.

    The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS score: 9.4), has been described as an authentication bypass related to FortiOS single sign-on (SSO). The flaw also affects FortiManager and FortiAnalyzer. The company said it’s continuing to investigate if other products, including FortiWeb and FortiSwitch Manager, are impacted by the flaw.

    “An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS, FortiManager, FortiAnalyzer may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices,” Fortinet said in an advisory released Tuesday.

    It’s worth noting that the FortiCloud SSO login feature is not enabled in the default factory settings. It’s only turned on in scenarios where an administrator registers the device to FortiCare from the device’s GUI, unless they have taken steps to explicitly toggle the “Allow administrative login using FortiCloud SSO” switch.

    The development comes days after Fortinet confirmed that unidentified threat actors were abusing a “new attack path” to achieve SSO logins without requiring any authentication. The access was abused to create local admin accounts for persistence, make configuration changes granting VPN access to those accounts, and exfiltrate those firewall configurations.

    Cybersecurity

    Over the past week, the network security vendor said it has taken the following steps –

    • Locked out two malicious FortiCloud accounts (cloud-noc@mail.io and cloud-init@mail.io) on January 22, 2026
    • Disabled FortiCloud SSO on the FortiCloud side on January 26, 2026
    • Re-enabled FortiCloud SSO on January 27, 2026, but disabling the option to login from devices running vulnerable versions

    In other words, customers are required to upgrade to the latest versions of the software for the FortiCloud SSO authentication to function. Fortinet is also urging users who detect signs of compromise to treat their devices as breached and recommends the following actions –

    • Ensure the device is running the latest firmware version
    • Restore configuration with a known clean version or audit for any unauthorized changes
    • Rotate credentials, including any LDAP/AD accounts that may be connected to the FortiGate devices

    The development has led the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to remediate the issues by January 30, 2026.



    Source link

    Active CVE202624858 Detected exploitation Fortinet FortiOS patches SSO
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Analytics Context Engineering for LLM

    February 4, 2026

    FBI takes notorious RAMP ransomware forum offline

    February 3, 2026

    New GlassWorm attack targets macOS via compromised OpenVSX extensions

    February 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Use Amazon MSK Connect and Iceberg Kafka Connect to build a real-time data lake

    February 5, 2026

    Detecting backdoored language models at scale

    February 4, 2026

    Piezotronic-probe modulates piezoelectric-electric-thermal coupling field in GaN power electronics

    February 4, 2026

    Hyundai Motor Group partners with Vodafone IoT to deploy connected cars in the Middle East

    February 4, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Use Amazon MSK Connect and Iceberg Kafka Connect to build a real-time data lake

    February 5, 2026

    Detecting backdoored language models at scale

    February 4, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.