{"id":11239,"date":"2026-01-28T18:20:48","date_gmt":"2026-01-29T00:20:48","guid":{"rendered":"https:\/\/beaconlab.us\/?post_type=publicacion&#038;p=11239"},"modified":"2026-01-30T09:54:31","modified_gmt":"2026-01-30T15:54:31","slug":"alerta-2026-10-vulnerabilidad-critica-fortinet","status":"publish","type":"publicacion","link":"https:\/\/beaconlab.us\/es\/publicacion\/alerta-2026-10-vulnerabilidad-critica-fortinet\/","title":{"rendered":"Alerta 2026-10 Vulnerabilidad Critica Fortinet"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Producto(s) afectado(s):<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FortiManager&nbsp;7.6.0&nbsp;&#8211;&nbsp;7.6.5, 7.2.0&nbsp;&#8211;&nbsp;7.2.11, 7.4.0&nbsp;&#8211;&nbsp;7.4.9, 7.6.0&nbsp;&#8211;&nbsp;7.6.5&nbsp;<\/li>\n\n\n\n<li>FortiOS&nbsp;7.0.0&nbsp;&#8211;&nbsp;7.0.18, 7.2.0&nbsp;&#8211;&nbsp;7.2.12, 7.4.0&nbsp;&#8211;&nbsp;7.4.10, 7.6.0&nbsp;&#8211;&nbsp;7.6.5&nbsp;<\/li>\n\n\n\n<li>FortiAnalyzer&nbsp;7.0.0&nbsp;&#8211;&nbsp;7.0.15, 7.2.0&nbsp;&#8211;&nbsp;7.2.11, 7.4.0&nbsp;&#8211;&nbsp;7.4.9, 7.6.0&nbsp;&#8211;&nbsp;7.6.5&nbsp;<\/li>\n\n\n\n<li>FortiProxy&nbsp;7.0, 7.2,&nbsp;7.4.0&nbsp;&#8211;&nbsp;7.4.12, 7.6.0&nbsp;&#8211;&nbsp;7.6.4&nbsp;<\/li>\n\n\n\n<li>FortiWeb&nbsp;7.4.0&nbsp;&#8211;&nbsp;7.4.11, 7.6.0&nbsp;&#8211;&nbsp;7.6.6, 8.0.0&nbsp;&#8211;&nbsp;8.0.3&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Descripci\u00f3n<\/h2>\n\n\n\n<p>Una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo [CWE-288] en\u00a0FortiOS,\u00a0FortiManager,\u00a0FortiAnalyzer,\u00a0FortiProxy\u00a0y\u00a0FortiWeb\u00a0podr\u00eda permitir que un atacante con una cuenta de\u00a0FortiCloud\u00a0y un dispositivo registrado inicie sesi\u00f3n en otros dispositivos registrados en otras cuentas, si la autenticaci\u00f3n SSO de\u00a0FortiCloud\u00a0est\u00e1 habilitada en dichos dispositivos.\u00a0Se etiqueto como CVE-2026-24858 con CVSSv3 9.4.<\/p>\n\n\n\n<p>La funci\u00f3n de inicio de sesi\u00f3n SSO de&nbsp;FortiCloud&nbsp;no est\u00e1 habilitada en la configuraci\u00f3n predeterminada de f\u00e1brica. Sin embargo, cuando un administrador registra el dispositivo en&nbsp;FortiCare&nbsp;desde la interfaz gr\u00e1fica de usuario (GUI) del dispositivo, a menos que desactive la opci\u00f3n \u00abPermitir inicio de sesi\u00f3n administrativo mediante SSO de&nbsp;FortiCloud\u00bb en la p\u00e1gina de registro, el inicio de sesi\u00f3n SSO de&nbsp;FortiCloud&nbsp;se habilita al registrarse.&nbsp;<\/p>\n\n\n\n<p>Ya se han reportado casos de explotaci\u00f3n de esta vulnerabilidad, lo que lo hace m\u00e1s urgente.&nbsp;FortiManager&nbsp;Cloud,&nbsp;FortiAnalyzer&nbsp;Cloud y&nbsp;FortiGate&nbsp;Cloud no se ven afectados.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Soluci\u00f3n<\/h2>\n\n\n\n<p>Los clientes deben actualizar a las \u00faltimas versiones del software para que funcione la autenticaci\u00f3n SSO de&nbsp;FortiCloud<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Informaci\u00f3n adicional:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/thehackernews.com\/2026\/01\/fortinet-patches-cve-2026-24858-after.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/thehackernews.com\/2026\/01\/fortinet-patches-cve-2026-24858-after.html<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/01\/28\/fortinet-releases-guidance-address-ongoing-exploitation-authentication-bypass-vulnerability-cve-2026\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/01\/28\/fortinet-releases-guidance-address-ongoing-exploitation-authentication-bypass-vulnerability-cve-2026<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/cyberpress.org\/fortinet-actively-exploited-forticloud-sso-vulnerability-cve-2026-24858\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cyberpress.org\/fortinet-actively-exploited-forticloud-sso-vulnerability-cve-2026-24858\/<\/a>&nbsp;<\/li>\n\n\n\n<li>https:\/\/arcticwolf.com\/resources\/blog\/cve-2026-24858\/&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"featured_media":0,"template":"","class_list":["post-11239","publicacion","type-publicacion","status-publish","hentry"],"acf":{"activar_pdf_link":false,"pdf":null,"numero_de_boletin":"","traffic_light_protocol":"Amber"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion\/11239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion"}],"about":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/types\/publicacion"}],"version-history":[{"count":2,"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion\/11239\/revisions"}],"predecessor-version":[{"id":11244,"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/publicacion\/11239\/revisions\/11244"}],"wp:attachment":[{"href":"https:\/\/beaconlab.us\/es\/wp-json\/wp\/v2\/media?parent=11239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}