Close Menu
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
X (Twitter) LinkedIn WhatsApp
Trending
  • Pentest ai agents: How 28 Subagents Turn AI Into a Real Pentest
  • Cybersecurity Weekly Report : April 19 – 26, 2026
  • Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks
  • Cybersecurity Weekly Report: March 23 – 29, 2026
  • Data Breach Detection Time 2026: The Full Guide
  • Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
Tuesday, May 5
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
Cyber infos
Data Breaches

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

V DiwaharBy V DiwaharJanuary 30, 2026Updated:March 24, 2026No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

More than 3,280,081 Fortinet devices are currently exposed online with internet-facing web properties, leaving a significant number of organizations at serious risk of compromise. The exposure is linked to CVE-2026-24858, a critical FortiCloud SSO authentication-bypass vulnerability that is already being actively exploited in the wild.

The flaw carries a CVSS score of 9.4, placing it among the most severe Fortinet vulnerabilities disclosed in 2026. It impacts widely deployed products including FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb. With attackers already abusing the weakness, security teams are under increasing pressure to act quickly to prevent unauthorized access and potential network-wide compromise.

Table of Contents hide
1 What Happened in the Fortinet Authentication Bypass Incident
2 Who Is Affected by CVE-2026-24858
3 Technical Details: How the Authentication Bypass Works
4 What You Should Do Now: Immediate Protection Steps
5 Official Response from Fortinet
6 Closing Thoughts

What Happened in the Fortinet Authentication Bypass Incident

The incident came to light after abnormal activity was observed targeting internet-exposed Fortinet management interfaces running FortiOS and related platforms. According to Fortinet, attackers were exploiting a flaw in FortiCloud Single Sign-On (SSO) that made it possible to cross authentication boundaries between different customer environments.

At the heart of CVE-2026-24858 is a design flaw that allows a threat actor with any FortiCloud account and a registered device to authenticate into other organizations’ Fortinet devices, provided FortiCloud SSO is enabled. Although the feature is disabled by default, it is often enabled during FortiCare device registration unless administrators explicitly disable the option allowing administrative login via FortiCloud SSO.

Once enabled, this setting can quietly expose FortiGate firewalls and other appliances to unauthorized access, often without triggering immediate alarms or alerts.

Who Is Affected by CVE-2026-24858

The scope of CVE-2026-24858 is broad and affects a wide cross-section of Fortinet customers worldwide.

  • Affected products: FortiOS, FortiManager, FortiAnalyzer, FortiProxy, FortiWeb
  • Vulnerable versions: Multiple releases across 7.x–8.x branches, as detailed in Fortinet advisories
  • Exposure type: Internet-facing web and management interfaces on Fortinet devices
  • At-risk users: Enterprises, managed service providers, government networks, and critical infrastructure operators

Based on internet-wide scanning data referenced by Censys, approximately 3,280,081 Fortinet devices were identified online with exposed web properties that could potentially be targeted by attackers.

Technical Details: How the Authentication Bypass Works

CVE-2026-24858 originates from a flaw in how FortiCloud SSO authentication requests are validated on affected Fortinet devices. When FortiCloud SSO is enabled, the systems fail to properly enforce tenant isolation, allowing authentication tokens to be accepted across different organizations.

According to Fortinet and multiple security advisories, exploitation typically follows this sequence:

  1. A threat actor controls a FortiCloud account with a registered device
  2. FortiCloud SSO is abused to authenticate against another organization’s Fortinet device
  3. Administrative access is granted without proper authorization checks

Once access is obtained, attackers were seen downloading full device configurations and creating persistent local administrator accounts across FortiOS, FortiManager, FortiAnalyzer, and FortiProxy systems. These accounts were deliberately named to appear legitimate, using names such as audit, backup, itadmin, secadmin, support, svcadmin, and system.

Fortinet also confirmed that two malicious FortiCloud accounts — cloud-noc@mail.io and cloud-init@mail.io — were directly involved in real-world exploitation of CVE-2026-24858.

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

What You Should Do Now: Immediate Protection Steps

Organizations using affected Fortinet products should take immediate action to reduce risk associated with CVE-2026-24858 and FortiCloud SSO exposure.

  1. Apply available patches immediately, upgrading to fixed versions such as FortiOS 7.4.11 or 7.6.6 and the corresponding FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb releases
  2. Disable FortiCloud SSO if patching cannot be completed right away, following Fortinet’s official guidance
  3. Review all administrator accounts and remove any unfamiliar or suspicious users
  4. Audit logs and configuration history for signs of unauthorized access or configuration downloads
  5. Restrict management interface exposure, limiting access to trusted networks or VPNs only

Delaying remediation significantly increases the risk of persistent access, configuration theft, and deeper compromise across environments that depend on Fortinet security devices.

Official Response from Fortinet

Fortinet confirmed active exploitation of CVE-2026-24858 on January 22, 2026, linking the attacks to FortiCloud SSO authentication bypass attempts targeting FortiOS and related platforms. On January 26, the company temporarily disabled FortiCloud SSO, re-enabling it the following day with version-based enforcement designed to block vulnerable devices until they are patched.

Security updates have since been released across multiple product lines, while FortiSwitch Manager remains under investigation for potential related impact.

In parallel, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) catalog on January 27, setting a mandatory remediation deadline of January 30, 2026 for U.S. federal agencies.

Closing Thoughts

With exploitation of CVE-2026-24858 already underway, this FortiCloud SSO authentication-bypass flaw represents a high-risk threat for organizations relying on Fortinet infrastructure for perimeter and network security. The incident highlights how cloud-based management features, when misconfigured or left unpatched, can dramatically expand an organization’s attack surface.

Administrators should act without delay by applying patches, disabling unnecessary features, and reviewing all privileged access on exposed Fortinet devices. Cyberinfos.in will continue tracking this CVE-2026-24858 campaign and provide updates as new information and mitigation guidance become available.

Related posts:

  1. Discord Data Breach 2025: 1.5 TB Data Leak Exposes Millions of ID Photos
  2. Data Breaches 2025: The 10 Biggest Incidents and Lessons Learned
  3. WIRED Data Breach Exposes 2.3 Million Subscriber Records | Full Incident Analysis
  4. Cognizant TriZetto Breach Exposes Data of 3.4M Patients
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats
Next Article Record 31.4 Tbps DDoS Attack Exposes AISURU/Kimwolf Botnet Power
V Diwahar
  • Website
  • LinkedIn

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

Data Breach Detection Time 2026: The Full Guide

March 28, 2026
Read More

FBI Wiretap Breach 2026: Surveillance Database Hacked

March 10, 2026
Read More

Cognizant TriZetto Breach Exposes Data of 3.4M Patients

March 8, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber Attacks & Exploits

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts

February 25, 2026

Google Antigravity Suspension Hits OpenClaw Users

February 24, 2026
Top 10 Security Tools

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Pentest ai agents: How 28 Subagents Turn AI Into a Real Pentest

April 30, 2026

Cybersecurity Weekly Report : April 19 – 26, 2026

April 27, 2026

Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks

April 13, 2026

Cybersecurity Weekly Report: March 23 – 29, 2026

March 30, 2026

Data Breach Detection Time 2026: The Full Guide

March 28, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
Copyright © 2026 cyberinfos.in - All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.