FortiSandbox Security Patch Released by Fortinet, Fixes Critical Vulnerability
Fortinet Issues 26 Security Advisories Fixing 27 Vulnerabilities
Fortinet has recently released 26 security advisories addressing 27 vulnerabilities across its product line.
Critical Flaws Discovered in FortiSandbox
Two critical-severity flaws were discovered in FortiSandbox, impacting the JRPC API and potentially allowing attackers to bypass authentication. A second critical bug, identified as CVE-2026-39808, involves an operating system command injection vulnerability that enables arbitrary code or command execution.
Vulnerability in FortiAnalyzer Cloud
A high-severity buffer overflow vulnerability was discovered in FortiAnalyzer Cloud (CVE-2026-22828), which could result in remote code execution or arbitrary command execution. However, successful exploitation would require significant effort due to Address Space Layout Randomization (ASLR) and network segmentation.
SQL Injection Vulnerabilities in FortiDDoS-F and FortiClientEMS
Fortinet also patched two high-severity SQL injection vulnerabilities in FortiDDoS-F and FortiClientEMS. These flaws can be exploited via crafted requests to run arbitrary SQL queries on the database, requiring authentication.
Additional Patches for Medium- and Low-Severity Issues
Fortinet also addressed various other security defects, including medium- and low-severity issues related to service discovery, cross-site scripting (XSS) attacks, code execution, information disclosure, path traversal attacks, file write and deletion, user redirects, configuration tampering, denial-of-service (DoS) attacks, database dump decryption, credential leaks, authentication bypass, and arbitrary directory deletion.
None of the patched vulnerabilities have been exploited in the wild, according to Fortinet, and additional information can be found on the company’s Product Security Incident Response Team (PSIRT) advisories page.
