CVE-2026-22572
Published: 10 March 2026
Summary
CVE-2026-22572 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Fortinet Fortianalyzer. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Authorizing remote access reduces the ability to bypass authentication via unauthorized alternate remote channels.
Users can identify logons via alternate paths or channels by reviewing the previous logon time.
Adaptive requirements can apply across access paths, reducing the ability to bypass authentication via alternate channels or paths.
Centralized IdPs close alternate authentication paths that enable bypass.
Enforces authentication for non-organizational users, making it harder to bypass via alternate paths or channels.
Requires authentication to occur exclusively over the isolated trusted path, directly preventing bypass via alternate or untrusted channels.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote auth bypass on public-facing Fortinet appliances via alternate path, directly facilitating T1190 exploitation and T1556.006 MFA evasion with known credentials.
NVD Description
An authentication bypass using an alternate path or channel vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2.2 through 7.2.11, FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.2 through 7.2.11 may allow an attacker…
more
with knowledge of the admins password to bypass multifactor authentication checks via submitting multiple crafted requests.
Deeper analysisAI
CVE-2026-22572 is an authentication bypass vulnerability using an alternate path or channel, classified under CWE-288. It affects Fortinet FortiAnalyzer versions 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, and 7.2.2 through 7.2.11, as well as FortiManager in the same version ranges. The issue enables an attacker with knowledge of an admin's password to bypass multifactor authentication checks by submitting multiple crafted requests, as disclosed on March 10, 2026.
The vulnerability has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating network-accessible exploitation with low complexity but requiring high privileges. An attacker who already knows the admin password can leverage crafted requests to evade MFA, achieving high confidentiality, integrity, and availability impacts, such as unauthorized administrative access to the FortiAnalyzer or FortiManager instances.
Fortinet's PSIRT advisory FG-IR-26-090 at https://fortiguard.fortinet.com/psirt/FG-IR-26-090 provides further details on the vulnerability, including mitigation steps and available patches.
Details
- CWE(s)