Description:
Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems. An attacker could exploit these vulnerabilities by sending specially crafted requests to an affected system.
Affected Systems:
- FortiAnalyzer version 6.4 (all versions), version 7.0 (all versions), version 7.2 (all versions), version 7.4 (all versions), version 7.6.0 through 7.6.4
- FortiAnalyzer Cloud version 6.4 (all versions), version 7.0 (all versions), version 7.2 (all versions), version 7.4.0 through 7.4.7, version 7.6.0 through 7.6.4
- FortiAnalyzer-BigData version 6.2 (all versions), version 6.4 (all versions), version 7.0 (all versions), version 7.2 (all versions), version 7.4.0 through 7.4.4, version 7.6.0
- FortiClientLinux version 7.2.2 through 7.2.12, version 7.4.0 through 7.4.4
- FortiDeceptor version 4.0 (all versions), version 4.1 (all versions), version 4.2 (all versions), version 4.3 (all versions), version 5.0 (all versions), version 5.1 (all versions), version 5.2 (all versions), version 5.3 (all versions), version 6.0 (all versions), version 6.2.0
- FortiMail version 7.0.0 through 7.0.8, version 7.2.0 through 7.2.7, version 7.4.0 through 7.4.4, version 7.6.0 through 7.6.2
- FortiManager version 6.4 (all versions), version 7.0 (all versions), version 7.2 (all versions), version 7.4 (all versions), version 7.6.0 through 7.6.4
- FortiManager Cloud version 6.4 (all versions), version 7.0 (all versions), version 7.2 (all versions), version 7.4.0 through 7.4.7, version 7.6.0 through 7.6.4
- FortiRecorder version 6.4 (all versions), version 7.0 (all versions), version 7.2.0 through 7.2.3
- FortiSIEM version 7.3.0 through 7.3.4, version 7.4.0
- FortiSOAR Agent Communication Bridge version 1.0 (all versions), version 1.1.0
- FortiSandbox version 4.0 (all versions), version 4.2 (all versions), version 4.4.0 through 4.4.7, version 5.0.0 through 5.0.2
- FortiSandbox Cloud version 5.0.4
- FortiSwitchAXFixed version 1.0.0 through 1.0.1
- FortiVoice version 7.0.0 through 7.0.6, version 7.2.0
- FortiWeb version 7.0 (all versions), version 7.2 (all versions), version 7.4 (all versions), version 7.6.0 through 7.6.6, version 8.0.0 through 8.0.3
For detailed information of the affected products, please refer to the section 'Affected Products' of corresponding security advisory at vendor's website.
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security restriction bypass, spoofing or tampering on an affected system.
Recommendation:
Patches for affected systems are available. System administrators of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://fortiguard.fortinet.com/psirt/FG-IR-26-077
- https://fortiguard.fortinet.com/psirt/FG-IR-26-078
- https://fortiguard.fortinet.com/psirt/FG-IR-26-079
- https://fortiguard.fortinet.com/psirt/FG-IR-26-080
- https://fortiguard.fortinet.com/psirt/FG-IR-26-081
- https://fortiguard.fortinet.com/psirt/FG-IR-26-082
- https://fortiguard.fortinet.com/psirt/FG-IR-26-083
- https://fortiguard.fortinet.com/psirt/FG-IR-26-084
- https://fortiguard.fortinet.com/psirt/FG-IR-26-085
- https://fortiguard.fortinet.com/psirt/FG-IR-26-086
- https://fortiguard.fortinet.com/psirt/FG-IR-26-087
- https://fortiguard.fortinet.com/psirt/FG-IR-26-088
- https://fortiguard.fortinet.com/psirt/FG-IR-26-089
- https://fortiguard.fortinet.com/psirt/FG-IR-26-090
- https://fortiguard.fortinet.com/psirt/FG-IR-26-091
- https://fortiguard.fortinet.com/psirt/FG-IR-26-092
- https://fortiguard.fortinet.com/psirt/FG-IR-26-093
- https://fortiguard.fortinet.com/psirt/FG-IR-26-094
- https://fortiguard.fortinet.com/psirt/FG-IR-26-095
- https://fortiguard.fortinet.com/psirt/FG-IR-26-096
- https://fortiguard.fortinet.com/psirt/FG-IR-26-097
- https://fortiguard.fortinet.com/psirt/FG-IR-26-098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48418
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49784
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53608
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54659
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54820
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55717
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68482
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68648
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22572
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22627 (to CVE-2026-22629)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24017 (to CVE-2026-24018)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24640 (to CVE-2026-24641)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25689
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25836
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25972
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30897