Fortinet and Ivanti Patch Management for Critical Security Vulnerabilities

www.news4hackers.com-fortinet-and-ivanti-patch-management-for-critical-security-vulnerabilities-fortinet-and-ivanti-patch-management-for-critical-security-vulnerabilities

Critical Vulnerabilities Patched in Fortinet and Ivanti Products

On Tuesday, Fortinet and Ivanti released patches for a total of 25 vulnerabilities across their respective product portfolios.

  • Three critical-severity bugs in Fortinet products
  • Four high-severity flaws in Ivanti software

Fortinet Patches

The three critical vulnerabilities in Fortinet products include CVE-2026-44277, CVE-2026-26083, and CVE-2025-53844, which affect various Fortinet products, including FortiAuthenticator, FortiSandbox, and FortiOS.

According to Fortinet, “FortiAuthenticator Cloud is not impacted by the issue, and hence customers do not need to perform any action.”

The most severe of these vulnerabilities, CVE-2026-44277, is a remote code execution bug that can be triggered by sending crafted requests to affected appliances.

Ivanti Patches

The four advisories detailing security defects impacting Ivanti software include:

  • Secure Access Client
  • Xtraction
  • Virtual Traffic Manager
  • Endpoint Manager (EPM)
According to Ivanti, “Successful exploitation of these bugs could lead to privilege escalation and remote code execution.”

Zoom Patches

Zoom also released patches for three security defects, including two high-severity issues in Rooms for Windows and Workplace VDI Plugin for Windows that could lead to privilege escalation.

Timeline

* Fortinet releases patches for 11 vulnerabilities, including three critical bugs.

* Ivanti publishes advisories for seven security defects, including four high-severity flaws.

* Zoom rolls out patches for three security defects, including two high-severity issues.

* All vulnerabilities are patched, but no awareness of exploitation in the wild.

Domains Affected

Fortinet: fortinet.com

Ivanti: ivanti.com

Zoom: zoom.us

Attack Techniques

* Remote code execution

* Privilege escalation

* External control of a file name issue

Threat Actor Behavior

No indication of exploitation in the wild

Financial Losses

Not specified

Law Enforcement Actions

Not mentioned



About Author

en_USEnglish