Cyber Posture

CVE-2026-22572

High

Published: 10 March 2026

Published
10 March 2026
Modified
16 March 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 26.7th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22572 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Fortinet Fortianalyzer. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-288

Authorizing remote access reduces the ability to bypass authentication via unauthorized alternate remote channels.

addresses: CWE-288

Users can identify logons via alternate paths or channels by reviewing the previous logon time.

addresses: CWE-288

Adaptive requirements can apply across access paths, reducing the ability to bypass authentication via alternate channels or paths.

addresses: CWE-288

Centralized IdPs close alternate authentication paths that enable bypass.

addresses: CWE-288

Enforces authentication for non-organizational users, making it harder to bypass via alternate paths or channels.

addresses: CWE-288

Requires authentication to occur exclusively over the isolated trusted path, directly preventing bypass via alternate or untrusted channels.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1556.006 Multi-Factor Authentication Defense Impairment
Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts.
Why these techniques?

CVE enables remote auth bypass on public-facing Fortinet appliances via alternate path, directly facilitating T1190 exploitation and T1556.006 MFA evasion with known credentials.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An authentication bypass using an alternate path or channel vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2.2 through 7.2.11, FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.2 through 7.2.11 may allow an attacker…

more

with knowledge of the admins password to bypass multifactor authentication checks via submitting multiple crafted requests.

Deeper analysisAI

CVE-2026-22572 is an authentication bypass vulnerability using an alternate path or channel, classified under CWE-288. It affects Fortinet FortiAnalyzer versions 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, and 7.2.2 through 7.2.11, as well as FortiManager in the same version ranges. The issue enables an attacker with knowledge of an admin's password to bypass multifactor authentication checks by submitting multiple crafted requests, as disclosed on March 10, 2026.

The vulnerability has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating network-accessible exploitation with low complexity but requiring high privileges. An attacker who already knows the admin password can leverage crafted requests to evade MFA, achieving high confidentiality, integrity, and availability impacts, such as unauthorized administrative access to the FortiAnalyzer or FortiManager instances.

Fortinet's PSIRT advisory FG-IR-26-090 at https://fortiguard.fortinet.com/psirt/FG-IR-26-090 provides further details on the vulnerability, including mitigation steps and available patches.

Details

CWE(s)

Affected Products

fortinet
fortianalyzer
7.2.2 — 7.4.8 · 7.6.0 — 7.6.4
fortinet
fortimanager
7.2.2 — 7.4.8 · 7.6.0 — 7.6.4
fortinet
fortimanager cloud
7.2.2 — 7.4.8 · 7.6.0 — 7.6.4

CVEs Like This One

CVE-2026-24858Same product: Fortinet Fortianalyzer
CVE-2025-61848Same product: Fortinet Fortianalyzer
CVE-2024-50563Same product: Fortinet Fortianalyzer
CVE-2024-50566Same product: Fortinet Fortimanager
CVE-2024-35275Same product: Fortinet Fortianalyzer
CVE-2024-45331Same product: Fortinet Fortianalyzer
CVE-2025-68648Same product: Fortinet Fortianalyzer
CVE-2025-24472Same vendor: Fortinet
CVE-2024-35273Same product: Fortinet Fortianalyzer
CVE-2024-33503Same product: Fortinet Fortianalyzer

References