9.8
CVE-2026-24858
- EPSS 3.71%
- Veröffentlicht 27.01.2026 19:18:23
- Zuletzt bearbeitet 29.01.2026 13:16:51
- Quelle psirt@fortinet.com
- CVE-Watchlists
- Unerledigt
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fortinet ≫ Fortianalyzer Version >= 7.0.0 <= 7.0.15
Fortinet ≫ Fortianalyzer Version >= 7.2.0 <= 7.2.11
Fortinet ≫ Fortianalyzer Version >= 7.4.0 < 7.4.10
Fortinet ≫ Fortianalyzer Version >= 7.6.0 < 7.6.6
Fortinet ≫ Fortimanager Version >= 7.0.0 <= 7.0.15
Fortinet ≫ Fortimanager Version >= 7.2.0 <= 7.2.11
Fortinet ≫ Fortimanager Version >= 7.4.0 < 7.4.10
Fortinet ≫ Fortimanager Version >= 7.6.0 < 7.6.6
Fortinet ≫ FortiProxy Version >= 7.0.0 <= 7.0.22
Fortinet ≫ FortiProxy Version >= 7.2.0 <= 7.2.15
Fortinet ≫ FortiProxy Version >= 7.4.0 <= 7.4.12
Fortinet ≫ FortiProxy Version >= 7.6.0 <= 7.6.4
27.01.2026: CISA Known Exploited Vulnerabilities (KEV) Catalog
Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability
SchwachstelleFortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy contain an authentication bypass using an alternate path or channel that could allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.
BeschreibungApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 3.71% | 0.877 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@fortinet.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.