CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs May 10, 2026

Critical FortiSandbox Vulnerabilities Allow Attackers to Execute Unauthorized Commands - CyberSecurityNews

CyberSecurityNews Archived May 10, 2026 ✓ Full text saved

Critical FortiSandbox Vulnerabilities Allow Attackers to Execute Unauthorized Commands CyberSecurityNews

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security Critical FortiSandbox Vulnerabilities Allow Attackers to Execute Unauthorized Commands By Guru Baran April 14, 2026 Fortinet has disclosed two critical security vulnerabilities affecting its FortiSandbox platform, both carrying a CVSSv3 score of 9.1. The flaws, published on April 14, 2026, could allow unauthenticated remote attackers to execute arbitrary commands and bypass authentication entirely, posing a serious risk to enterprise environments relying on FortiSandbox for advanced threat detection. OS Command Injection Flaw (CVE-2026-39808) The first vulnerability, tracked as CVE-2026-39808, is an Improper Neutralization of Special Elements used in an OS Command, classified under CWE-78. The flaw resides in the FortiSandbox API component and enables an unauthenticated attacker to execute unauthorized code or commands by sending specially crafted HTTP requests. With no authentication required and a network-based attack vector, this vulnerability represents a low-complexity, high-impact threat. Successful exploitation could result in full compromise of the sandboxing environment, undermining the very system designed to analyze and contain malicious files. Affected versions and remediation: FortiSandbox 4.4 (versions 4.4.0 through 4.4.8) — upgrade to 4.4.9 or above FortiSandbox 5.0 — not affected FortiSandbox PaaS 5.0 — not impacted; no action required The vulnerability was responsibly disclosed by Samuel de Lucas Maroto from KPMG Spain, and Fortinet has acknowledged the researcher’s contribution. Authentication Bypass via Path Traversal (CVE-2026-39813) The second critical vulnerability, CVE-2026-39813, is a Path Traversal flaw classified under CWE-24, affecting the FortiSandbox JRPC API. An unauthenticated attacker can exploit this weakness using specially crafted HTTP requests to bypass authentication controls, with the primary impact being escalation of privilege. Like the first flaw, this vulnerability also carries a CVSSv3 score of 9.1 and requires no user interaction or prior authentication, making it equally dangerous in exposed deployments. This vulnerability was internally discovered and reported by Loic Pantano of Fortinet PSIRT. Affected versions and remediation: FortiSandbox 5.0 (versions 5.0.0 through 5.0.5) — upgrade to 5.0.6 or above FortiSandbox 4.4 (versions 4.4.0 through 4.4.8) — upgrade to 4.4.9 or above FortiSandbox 5.2 and 4.2 — not affected Neither vulnerability has been observed as exploited in the wild as of publication, but given their critical severity scores and unauthenticated attack vectors, organizations should treat these disclosures as high-priority. Security teams are urged to apply the recommended patches immediately, audit FortiSandbox deployments for exposure, and restrict API access to trusted networks as a temporary mitigation while updates are being rolled out. Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories. Tags cyber security cyber security news vulnerability Copy URL Linkedin Twitter ReddIt Telegram Guru Baranhttps://cybersecuritynews.com Gurubaran KS is a cybersecurity analyst, and Journalist with a strong focus on emerging threats and digital defense strategies. He is the Co-Founder and Editor-in-Chief of Cyber Security News, where he leads editorial coverage on global cybersecurity developments. Trending News TCLBANKER Malware Targets Users Through Self-Propagating WhatsApp and Outlook Worm Modules Škoda Security Incident Exposes Customers Data From Online Shop Critical Palo Alto Firewalls Vulnerability Exploited in the Wild to Gain Root Access Email Bombing and Fake IT Support Calls Fuel New Microsoft Teams Phishing Attacks Trellix Breach – RansomHouse Claims Access to Parts of Source Code Latest News Cyber Security News TCLBANKER Malware Targets Users Through Self-Propagating WhatsApp and Outlook Worm Modules Cyber Security News NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce Users Cyber Security Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident Cyber Security Critical Microsoft 365 Copilot Vulnerabilities Expose sensitive Information Cyber Security News New PamDOORa Backdoor Attacking Linux Systems to Steal SSH Credentials
    💬 Team Notes
    Article Info
    Source
    CyberSecurityNews
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    May 10, 2026
    Archived
    May 10, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗