9.8

CVE-2026-24858

Warnung
Medienbericht
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FortinetFortianalyzer Version >= 7.0.0 <= 7.0.15
FortinetFortianalyzer Version >= 7.2.0 <= 7.2.11
FortinetFortianalyzer Version >= 7.4.0 < 7.4.10
FortinetFortianalyzer Version >= 7.6.0 < 7.6.6
FortinetFortimanager Version >= 7.0.0 <= 7.0.15
FortinetFortimanager Version >= 7.2.0 <= 7.2.11
FortinetFortimanager Version >= 7.4.0 < 7.4.10
FortinetFortimanager Version >= 7.6.0 < 7.6.6
FortinetFortiProxy Version >= 7.0.0 <= 7.0.22
FortinetFortiProxy Version >= 7.2.0 <= 7.2.15
FortinetFortiProxy Version >= 7.4.0 <= 7.4.12
FortinetFortiProxy Version >= 7.6.0 <= 7.6.4
FortinetFortiweb Version >= 7.4.0 <= 7.4.11
FortinetFortiweb Version >= 7.6.0 <= 7.6.6
FortinetFortiweb Version >= 8.0.0 <= 8.0.3
FortinetFortiOS Version >= 7.0.0 <= 7.0.18
FortinetFortiOS Version >= 7.2.0 <= 7.2.12
FortinetFortiOS Version >= 7.4.0 < 7.4.11
FortinetFortiOS Version >= 7.6.0 < 7.6.6

27.01.2026: CISA Known Exploited Vulnerabilities (KEV) Catalog

Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability

Schwachstelle

Fortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy contain an authentication bypass using an alternate path or channel that could allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Beschreibung

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.71% 0.877
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@fortinet.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-288 Authentication Bypass Using an Alternate Path or Channel

The product requires authentication, but the product has an alternate path or channel that does not require authentication.