Fortinet blocks exploited FortiCloud SSO zero day until patch is ready
- January 27, 2026
- 06:19 PM
- 0

Fortinet has confirmed a new, actively exploited critical FortiCloud single sign-on (SSO) authentication bypass vulnerability, tracked as CVE-2026-24858, and says it has mitigated the zero-day attacks by blocking FortiCloud SSO connections from devices running vulnerable firmware versions.
The flaw allows attackers to abuse FortiCloud SSO to gain administrative access to FortiOS, FortiManager, and FortiAnalyzer devices registered to other customers, even when those devices were fully patched against a previously disclosed vulnerability.
The confirmation comes after Fortinet customers reported compromised FortiGate firewalls on January 21, with attackers creating new local administrator accounts via FortiCloud SSO on devices running the latest available firmware.
The attacks were initially thought to be through a patch bypass for CVE-2025-59718, a previously exploited critical FortiCloud SSO authentication bypass flaw that was patched in December 2025.
Fortinet admins reported that the hackers were logging into FortiGate devices via FortiCloud SSO using the email address cloud-init@mail.io, then creating new local admin accounts.
Logs shared by impacted customers showed similar indicators observed during December exploitation.
On January 22, cybersecurity firm Arctic Wolf confirmed the attacks, saying the attacks appeared automated, with new rogue admin and VPN-enabled accounts created and firewall configurations exfiltrated within seconds. Arctic Wolf said the attack appeared similar to a previous campaign exploiting CVE-2025-59718 in December.
Fortinet confirms alternate attack path
On January 23, Fortinet confirmed that attackers were exploiting an alternate authentication path that remained even on fully patched systems.
Fortinet CISO Carl Windsor said the company had observed cases in which devices running the latest firmware were compromised, indicating that a new attack path was being exploited.
While Fortinet said exploitation had only been seen through FortiCloud SSO, it warned that the issue also applies to other SAML-based SSO implementations.
“It is important to note that while, at this time, only exploitation of FortiCloud SSO has been observed, this issue is applicable to all SAML SSO implementations,” explained Fortinet.
At the time, Fortinet advised customers to restrict administrative access to their devices and disable FortiCloud SSO as a mitigation.
The advisory states that Fortinet took actions to mitigate the attacks while patches are being developed.
- On January 22, Fortinet disabled FortiCloud accounts that were being abused by the attackers.
- On January 26, Fortinet disabled FortiCloud SSO globally on the FortiCloud side to prevent further abuse.
- On January 27, FortiCloud SSO access was restored but restricted so that devices running vulnerable firmware can no longer authenticate via SSO.
Fortinet says this server-side change effectively blocks exploitation even if FortiCloud SSO remains enabled on affected devices, so there is nothing that needs to be done client-side until patches are released.
On January 27, Fortinet also published a formal PSIRT advisory assigning CVE-2026-24858 to the flaw, rating it critical with a CVSS score of 9.4.
The vulnerability is “Authentication Bypass Using an Alternate Path or Channel,” caused by improper access control in FortiCloud SSO.
According to the advisory, attackers with a FortiCloud account and a registered device could authenticate to other customers’ devices if FortiCloud SSO was enabled.
While FortiCloud SSO is not enabled by default, Fortinet says it will automatically turn on when a device is registered with FortiCare, unless it is manually disabled afterward.
Fortinet confirmed the vulnerability was exploited in the wild by the following two malicious FortiCloud SSO accounts, which were locked out on January 22.
cloud-noc@mail.io
cloud-init@mail.io
Fortinet says that once a device was breached, they would download customer config files and create one of the following admin accounts:
audit
backup
itadmin
secadmin
support
backupadmin
deploy
remoteadmin
security
svcadmin
system
Connections were seen made from the following IP addresses:
104.28.244.115
104.28.212.114
104.28.212.115
104.28.195.105
104.28.195.106
104.28.227.106
104.28.227.105
104.28.244.114
Additional IPs observed by a third party, not Fortinet:
37[.]1.209.19
217[.]119.139.50
The company says patches are still in development, including for FortiOS, FortiManager, and FortiAnalyzer.
Until then, FortiCloud SSO is blocking logins from vulnerable devices, so administrators do not need to disable the feature to prevent exploitation.
However, Fortinet said this could be abused with other SAML SSO implementations, admins may want to disable the SSO feature for the time being with the following command:
config system global
set admin-forticloud-sso-login disable
end
Fortinet also said it still investigating whether FortiWeb and FortiSwitch Manager are affected by the flaw.
The company warns that customers who detect the above indicators of compromise in their logs should treat their devices as fully compromised.
Fortinet recommends reviewing all administrator accounts, restoring configurations from known-clean backups, and rotating all credentials.
7 Security Best Practices for MCP
As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.
This free cheat sheet outlines 7 best practices you can start using today.
Source: www.bleepingcomputer.com

