CVE Vulnerabilities

CVE-2026-24858

Authentication Bypass Using an Alternate Path or Channel

Published: Jan 27, 2026 | Modified: Jan 29, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Weakness

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

NameVendorStart VersionEnd Version
FortianalyzerFortinet7.0.0 (including)7.0.15 (including)
FortianalyzerFortinet7.2.0 (including)7.2.11 (including)
FortianalyzerFortinet7.4.0 (including)7.4.10 (excluding)
FortianalyzerFortinet7.6.0 (including)7.6.6 (excluding)
FortimanagerFortinet7.0.0 (including)7.0.15 (including)
FortimanagerFortinet7.2.0 (including)7.2.11 (including)
FortimanagerFortinet7.4.0 (including)7.4.10 (excluding)
FortimanagerFortinet7.6.0 (including)7.6.6 (excluding)
FortiproxyFortinet7.0.0 (including)7.0.22 (including)
FortiproxyFortinet7.2.0 (including)7.2.15 (including)
FortiproxyFortinet7.4.0 (including)7.4.12 (including)
FortiproxyFortinet7.6.0 (including)7.6.4 (including)
FortiwebFortinet7.4.0 (including)7.4.11 (including)
FortiwebFortinet7.6.0 (including)7.6.6 (including)
FortiwebFortinet8.0.0 (including)8.0.3 (including)
FortiosFortinet7.0.0 (including)7.0.18 (including)
FortiosFortinet7.2.0 (including)7.2.12 (including)
FortiosFortinet7.4.0 (including)7.4.11 (excluding)
FortiosFortinet7.6.0 (including)7.6.6 (excluding)

Potential Mitigations

References