Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1953 articles · 105777 vulns · 38/41 feeds (7d)
← Back to list
9.8
CVE-2026-24858KEVEXPLOITED
fortinet · fortianalyzer

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Affected Products

VendorProductVersions
fortinetfortianalyzer<= 7.0.15, <= 7.2.11, < 7.4.10, < 7.6.6, <= 7.0.15, <= 7.2.11, < 7.4.10, < 7.6.6, <= 7.0.22, <= 7.2.15, <= 7.4.12, <= 7.6.4, <= 7.4.11, <= 7.6.6, <= 8.0.3, <= 7.0.18, <= 7.2.12, < 7.4.11, < 7.6.6, 7.4.4

References

  • https://fortiguard.fortinet.com/psirt/FG-IR-26-060(Vendor Advisory)
  • https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-24858(US Government Resource)
  • https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios(Mitigation, Vendor Advisory)

Related News (1 articles)

Tier D
BleepingComputer5h ago
Critical Fortinet Forticlient EMS flaw now exploited in attacks
→ No new info (linked only)
CVSS 3.19.8 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA KEV✅ Yes
Actively exploited✅ Yes
CWECWE-288
Published1/27/2026
Last enriched5h agov2
Tags
SQL InjectionCritical
Trending Score98
Source articles1
Independent1
Info Completeness10/14
Missing: epss, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-21643EXPKEV
An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized cod
Trending: 115
NONECVE-2026-33640
Outline has a rate limit bypass that allows brute force of email login OTP
Trending: 16
HIGHCVE-2025-59922
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiClientEMS 7.4.3 through 7.4.4, FortiClientEMS 7.4.0 throug
HIGHCVE-2025-66178
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 throug
MEDIUMCVE-2026-30897
A stack-based buffer overflow vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Jan 27, 2026
Added to CISA KEV
Jan 27, 2026
Actively Exploited
Jan 29, 2026
Exploit Available
Jan 29, 2026
Patch Available
Jan 29, 2026
Discovered by ZDM
Mar 26, 2026
Updated: affectedVersions, tags
Mar 30, 2026

Version History

v2
Last enriched 5h ago
v2Tier D5h ago

Added details about CVE-2026-21643, including its description, affected version, patch information, and new IoCs.

affectedVersionstags
via BleepingComputer
v13d ago

Initial creation