Fortinet’s January 27, 2026 advisory for FG-IR-26-060 is the kind of notice defenders should read with coffee in one hand and inventory in the other. The issue is a critical authentication bypass in FortiOS and FortiProxy when FortiCloud Single Sign-On is enabled. That combination of words should already make the room quieter. Authentication bypass on an internet-facing control surface is not a nuance problem. It is a time problem.

What makes this class of issue consistently dangerous is not just severity. It is placement. Remote administration layers sit right at the trust boundary where convenience, exposure, and privilege like to hold hands and pretend nothing bad will happen. Then a bypass lands and everyone remembers, very suddenly, that identity controls are only comforting while they continue to exist in fact rather than in architecture diagrams.

The deeper lesson is that SSO integrations can create a false sense of maturity if the organization stops at “we centralized login.” Centralization helps, but it does not repeal software risk. If the gateway, appliance, or service validating that identity flow has a bypass condition, the elegance of the identity story evaporates fast. Security teams should be especially skeptical of edge systems that inherit trust from higher-order controls and then quietly become choke points with admin access.

This is why critical edge advisories deserve their own response muscle memory. Teams should know where affected versions live, whether the exposed administrative path is reachable, whether temporary restrictions can be applied quickly, and how privileged those systems remain relative to the tasks they actually perform. If the answer to any of that is “we should be able to find out,” then congratulations, the incident has already begun spiritually.

Fortinet’s advisory includes affected versions and upgrade guidance, which is useful. But the right operational response is broader than “patch when possible.” Review exposure. Validate internet reachability. Tighten management access if you can. Confirm logging and alerting around admin workflows. This is one of those bug classes where compensating controls are not an optional side dish. They are what buys you breathing room while the patch train catches up.

Sources

Primary source: Fortinet PSIRT, January 27, 2026, “Authentication bypass in FortiOS and FortiProxy with FortiCloud single sign-on enabled.” https://fortiguard.fortinet.com/psirt/FG-IR-26-060