{"dataType": "CVE_RECORD", "containers": {"cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*"], "vendor": "fortinet", "product": "fortianalyzer", "versions": [{"status": "affected", "version": "7.4.0", "lessThan": "7.4.10", "versionType": "custom"}, {"status": "affected", "version": "7.6.0", "lessThan": "7.6.6", "versionType": "custom"}, {"status": "affected", "version": "7.0.0", "versionType": "custom", "lessThanOrEqual": "7.0.15"}, {"status": "affected", "version": "7.2.0", "versionType": "custom", "lessThanOrEqual": "7.2.11"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*"], "vendor": "fortinet", "product": "fortimanager", "versions": [{"status": "affected", "version": "7.4.0", "lessThan": "7.4.10", "versionType": "custom"}, {"status": "affected", "version": "7.6.0", "lessThan": "7.6.6", "versionType": "custom"}, {"status": "affected", "version": "7.0.0", "versionType": "custom", "lessThanOrEqual": "7.0.15"}, {"status": "affected", "version": "7.2.0", "versionType": "custom", "lessThanOrEqual": "7.2.11"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*"], "vendor": "fortinet", "product": "fortiproxy", "versions": [{"status": "affected", "version": "7.0.0", "versionType": "custom", "lessThanOrEqual": "7.0.22"}, {"status": "affected", "version": "7.2.0", "versionType": "custom", "lessThanOrEqual": "7.2.15"}, {"status": "affected", "version": "7.4.0", "versionType": "custom", "lessThanOrEqual": "7.4.12"}, {"status": "affected", "version": "7.6.0", "versionType": "custom", "lessThanOrEqual": "7.6.4"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*"], "vendor": "fortinet", "product": "fortiweb", "versions": [{"status": "affected", "version": "7.4.0", "versionType": "custom", "lessThanOrEqual": "7.4.11"}, {"status": "affected", "version": "7.6.0", "versionType": "custom", "lessThanOrEqual": "7.6.6"}, {"status": "affected", "version": "8.0.0", "versionType": "custom", "lessThanOrEqual": "8.0.3"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"], "vendor": "fortinet", "product": "fortios", "versions": [{"status": "affected", "version": "7.4.0", "lessThan": "7.4.11", "versionType": "custom"}, {"status": "affected", "version": "7.6.0", "lessThan": "7.6.6", "versionType": "custom"}, {"status": "affected", "version": "7.0.0", "versionType": "custom", "lessThanOrEqual": "7.0.18"}, {"status": "affected", "version": "7.2.0", "versionType": "custom", "lessThanOrEqual": "7.2.12"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios", "tags": ["mitigation", "vendor-advisory"]}, {"url": "https://fortiguard.fortinet.com/psirt/FG-IR-26-060", "tags": ["vendor-advisory"]}, {"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-24858", "tags": ["x_us-government-resource"]}], "descriptions": [{"lang": "en", "value": "An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-288", "description": "CWE-288"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2026-01-27T20:16:24Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2026-24858", "state": "PUBLISHED", "dateUpdated": "2026-01-29T13:16:51Z", "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "datePublished": "2026-01-27T20:16:24Z", "assignerShortName": "fortinet"}, "dataVersion": "5.0"}