Fortinet FortiAnalyzer MFA Bypass in GUI (FG-IR-26-090)

high Nessus Plugin ID 301721

Synopsis

Fortinet Firewall is missing one or more security-related updates.

Description

The version of FortiAnalyzer installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the FG-IR-26-090 advisory.

- An authentication bypass using an alternate path or channel vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2.2 through 7.2.11, FortiAnalyzer Cloud 7.6.0 through 7.6.3, FortiAnalyzer Cloud 7.4.0 through 7.4.7, FortiAnalyzer Cloud 7.2.2 through 7.2.10, FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.2 through 7.2.11, FortiManager Cloud 7.6.0 through 7.6.3, FortiManager Cloud 7.4.0 through 7.4.7, FortiManager Cloud 7.2.2 through 7.2.10 may allow an attacker with knowledge of the admins password to bypass multifactor authentication checks via submitting multiple crafted requests. (CVE-2026-22572)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

For 7.2.x, see vendor advisory. For 7.4.x, upgrade to FortiAnalyzer version 7.4.8 or later. For 7.6.x, upgrade to FortiAnalyzer version 7.6.4 or later.

See Also

https://www.fortiguard.com/psirt/FG-IR-26-090

Plugin Details

Severity: High

ID: 301721

File Name: fortianalyzer_FG-IR-26-090.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 3/10/2026

Updated: 3/10/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C

CVSS Score Source: CVE-2026-22572

CVSS v3

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:fortinet:fortianalyzer

Required KB Items: Host/Fortigate/model, Host/Fortigate/version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/10/2026

Vulnerability Publication Date: 3/10/2026

Reference Information

CVE: CVE-2026-22572