Executive Summary
In June 2024, Fortinet disclosed a critical zero-day vulnerability that was actively exploited by threat actors to compromise FortiCloud single sign-on (SSO) authentication, enabling unauthorized access to customer devices. Attackers leveraged the flaw to perform malicious SSO logins, bypassing authentication controls and potentially moving laterally within affected network environments. In response, Fortinet took the unprecedented step of disabling FortiCloud SSO services temporarily for all users while investigating and developing a fix. This incident underscores significant risks associated with identity and access management in cloud-delivered network security platforms.
This breach highlights the growing prevalence of zero-day exploitation targeting authentication mechanisms and cloud infrastructure. As attackers increasingly focus on SSO and federated identity systems, organizations must reassess their reliance on third-party authentication, strengthen monitoring, and accelerate adoption of zero trust strategies.
Why This Matters Now
Zero-day attacks against authentication and cloud management platforms are escalating, posing urgent risks to enterprises relying on SSO and cloud-based controls. Organizations must act rapidly to assess exposure, implement alternative controls, and prioritize visibility to counter similar threats.
Attack Path Analysis
Attackers exploited a Fortinet zero-day vulnerability to hijack SSO authentication and gain unauthorized access to cloud devices. Leveraging compromised privileges, they attempted to escalate permissions and access sensitive cloud resources. Attempts were made to move laterally across east-west cloud workloads in the environment. The attackers established command and control channels to maintain persistent access or issue remote commands. Data exfiltration tactics were likely employed, focusing on extracting sensitive information over encrypted or unmonitored outbound channels. Ultimately, the impact could include service disruption, unauthorized access to critical assets, or preparation for further disruptive actions.
Kill Chain Progression
Initial Compromise
Description
Adversaries exploited a Fortinet SSO zero-day to gain unauthorized initial access to cloud devices using malicious authentication requests.
Related CVEs
CVE-2026-24858
CVSS 9.8An authentication bypass vulnerability in FortiCloud SSO allows unauthenticated attackers to gain administrative access to affected devices.
Affected Products:
Fortinet FortiOS – 7.6.0 through 7.6.5, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, 7.0.0 through 7.0.15
Fortinet FortiManager – 7.6.0 through 7.6.5, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, 7.0.0 through 7.0.15
Fortinet FortiAnalyzer – 7.6.0 through 7.6.5, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, 7.0.0 through 7.0.15
Fortinet FortiProxy – 7.6.0 through 7.6.5, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, 7.0.0 through 7.0.15
Exploit Status:
exploited in the wildCVE-2025-59718
CVSS 9.8An authentication bypass vulnerability in FortiCloud SSO allows unauthenticated attackers to gain administrative access to affected devices.
Affected Products:
Fortinet FortiOS – 7.0.0 through 7.0.17, 7.2.0 through 7.2.11, 7.4.0 through 7.4.8, 7.6.0 through 7.6.3
Fortinet FortiProxy – 7.0.0 through 7.0.21, 7.2.0 through 7.2.14, 7.4.0 through 7.4.10, 7.6.0 through 7.6.3
Fortinet FortiSwitchManager – 7.0.0 through 7.0.5, 7.2.0 through 7.2.6
Exploit Status:
exploited in the wildCVE-2025-59719
CVSS 9.8An authentication bypass vulnerability in FortiCloud SSO allows unauthenticated attackers to gain administrative access to affected devices.
Affected Products:
Fortinet FortiWeb – 7.4.0 through 7.4.9, 7.6.0 through 7.6.4, 8.0.0
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Modify Authentication Process: Web Portal Modification
Valid Accounts
Unsecured Credentials
Brute Force: Credential Stuffing
Use Alternate Authentication Material: Pass the Hash
Container Administration Command
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Strong Authentication for Access
Control ID: 8.3.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Art. 9
CISA Zero Trust Maturity Model 2.0 – Continuous Identity Validation
Control ID: Identity Pillar: Identity Verification
NIS2 Directive – Risk Analysis and Security Policies
Control ID: Article 21(2)(a)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer/Network Security
Zero-day Fortinet SSO exploit directly impacts security vendors' infrastructure, forcing emergency authentication shutdowns and compromising zero trust segmentation capabilities.
Financial Services
SSO authentication disruption threatens banking operations requiring HIPAA/PCI compliance, potentially enabling lateral movement and data exfiltration in regulated environments.
Health Care / Life Sciences
Healthcare organizations face critical authentication failures affecting patient data access while zero-day exploits bypass encrypted traffic protections mandated by HIPAA.
Government Administration
Government agencies experience compromised SSO systems enabling privilege escalation and command-control activities, undermining NIST cybersecurity framework compliance requirements.
Sources
- Fortinet Confirms New Zero-Day Behind Malicious SSO Loginshttps://www.darkreading.com/vulnerabilities-threats/fortinet-new-zero-day-malicious-sso-loginsVerified
- Fortinet starts patching exploited FortiCloud SSO zero-day (CVE-2026-24858)https://www.helpnetsecurity.com/2026/01/28/fortinet-forticloud-sso-zero-day-vulnerability-cve-2026-24858/Verified
- Critical Fortinet Zero-Day CVE-2026-24858 Under Attackhttps://www.ctrlaltnod.com/news/critical-fortinet-zero-day-exploited-admin-access-compromised/Verified
- Fortinet Blocks Exploited FortiCloud SSO Zero-Dayhttps://www.tachyonsecurity.com/post/fortinet-blocks-exploited-forticloud-sso-zero-dayVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
This incident highlights the necessity of Zero Trust and CNSF approaches, as attackers exploited SSO weaknesses and moved laterally to compromise cloud infrastructure. Applied segmentation, identity validation, workload isolation, and strict egress monitoring could have limited unauthorized access, contained movement, and revealed attempts at data exfiltration.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: Access could have been detected or blocked through cloud-native identity controls and continuous posture evaluation.
Control: Zero Trust Segmentation
Mitigation: Role-based segmentation could have restricted escalation paths and limited attacker's privilege gains.
Control: East-West Traffic Security
Mitigation: Lateral spread could have been constrained or flagged via workload isolation and traffic monitoring.
Control: Multicloud Visibility & Control
Mitigation: C2 traffic could have been detected or disrupted using centralized inspection and behavioral analytics.
Control: Egress Security & Policy Enforcement
Mitigation: Data exfiltration could have been detected or blocked through strict egress policies and monitoring.
Comprehensive Zero Trust and CNSF controls may reduce the likelihood or impact of successful disruption or further compromise.
Impact at a Glance
Affected Business Functions
- Network Security Management
- Access Control Systems
Estimated downtime: 3 days
Estimated loss: $500,000
Potential exposure of firewall configurations, network topology, and security policies.
Recommended Actions
Key Takeaways & Next Steps
- • Deploy cloud-native security fabric to inspect and enforce SSO authentication integrity in real time.
- • Enforce zero trust segmentation and least-privilege access between identities, workloads, and services to constrain attacker movement.
- • Implement granular east-west controls to monitor and block unauthorized internal cloud traffic.
- • Establish centralized visibility and egress policy enforcement to detect and prevent data exfiltration or unauthorized outbound connections.
- • Integrate anomaly detection, automated response, and policy-driven governance to quickly respond to future zero-day exploits.



