Fortinet patches eleven security vulnerabilities in several products

Fortinet concertedly released eleven security patches for "Patch Tuesday". Two of the leaks are considered critical.

listen Print view
3 min. read

Fortinet published eleven advisories for security vulnerabilities in various products during the second Tuesday of the month – commonly known as “Patch Tuesday” or simply Patchday, familiar from the Microsoft world. Two of these are considered critical vulnerabilities and one is highly risky.

A critical vulnerability exists in FortiAuthenticator due to insufficient access controls. It allows attackers to execute unauthorized code or commands with manipulated requests without prior authentication (CVE-2026-44277, CVSS 9.1, Risk “critical”). FortiAuthenticator 6.5.7, 6.6.9, and 8.0.3, as well as newer versions, correct this. With manipulated HTTP requests, malicious actors can execute unauthorized code or commands in FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS Web UI due to a lack of authorization (CVE-2026-26083, CVSS 9.1, Risk “critical”).

In the FortiOS CAPWAP-Daemon, attackers who have control over authenticated FortiAP FortiExtender or FortiSwitches can gain execution privileges on the FortiGate devices. This is due to possible write accesses outside of intended memory boundaries. However, Fortinet does not explain how these can be provoked (CVE-2025-53844, CVSS 8.3, Risk “high”).

Fortinet also warns of further vulnerabilities. Sorted by severity, these are:

Videos by heise

IT managers should check if they are using vulnerable Fortinet appliances and apply available updates promptly.

For the April “Patchday”, Fortinet had addressed 18 security vulnerabilities. The developers also classified some of these as critical risks. Since Fortinet is directly connected to networks, software vulnerabilities are a coveted target for criminals. In early April, for example, malicious actors attacked a critical security vulnerability in FortiClient EMS.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.