Fixed Intel
Aggregated IntelIndustry News

Fortinet Patches Critical FortiSandbox Vulnerabilities

The flaws could allow attackers to bypass authentication or execute arbitrary code or commands via HTTP requests.

FIFixed Intel Team||2 min read|2 Views
Fortinet Patches Critical FortiSandbox Vulnerabilities

Aggregated from SecurityWeek

This article was automatically aggregated from an external source. Content may be summarized.

Read Original

Full Analysis

Fortinet on Tuesday released 26 advisories detailing 27 vulnerabilities across its products, including two critical-severity flaws in FortiSandbox.

Tracked as CVE-2026-39813, the first of the critical bugs impacts the FortiSandbox JRPC API and could allow attackers to bypass authentication.

The second one, tracked as CVE-2026-39808, is an OS command injection issue that can be exploited for arbitrary code or command execution.

Both security defects have a CVSS score of 9.1 and could be exploited without authentication via specially crafted HTTP requests.

On Tuesday, Fortinet also patched CVE-2026-22828, a high-severity buffer overflow vulnerability in FortiAnalyzer Cloud that could be exploited without authentication for remote code execution or arbitrary command execution.

“Successful exploitation would require a large amount of effort in preparation because of ASLR and network segmentation. Thanks to network segmentation, this vulnerability could only be exploited if the attacker has already access to another cloud component belonging to the same entity,” Fortinet says.

Advertisement. Scroll to continue reading.

The company also addressed two high-severity SQL injection bugs in FortiDDoS-F and FortiClientEMS that could be exploited via crafted requests to run arbitrary SQL queries on the database. Both flaws require authentication.

The remaining security defects patched by Fortinet on Tuesday are medium- and low-severity issues leading to service discovery, XSS attacks, code execution, information disclosure, path traversal attacks, file write and deletion, user redirects, configuration tampering, denial-of-service (DoS) attacks, database dump decryption, credential leaks, authentication bypass, and arbitrary directory deletion.

Fortinet makes no mention of any of these vulnerabilities being exploited in the wild. Additional information can be found on the company’s PSIRT advisories page.

Related: ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Related: Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Related: Adobe Patches 55 Vulnerabilities Across 11 Products

Related: SAP Patches Critical ABAP Vulnerability


Originally published by SecurityWeek

Original Source

SecurityWeek