Fortinet Patches Five Vulnerabilities Across FortiAP, FortiOS, and Enterprise Products
Cybersecurity NewsArchived May 12, 2026✓ Full text saved
Fortinet released security advisories on May 12, 2026, addressing five vulnerabilities spanning its wireless access point controllers, network operating system, and enterprise management platforms, including a critical unauthenticated authorization bypass in FortiSandbox. Critical Flaw in FortiSandbox The most severe vulnerability disclosed is CVE-2026-26083 (FG-IR-26-136), a missing authorization flaw affecting FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS. […] The post Fortinet Patch
Full text archived locally
✦ AI Summary· Claude Sonnet
HomeCyber Security
Fortinet Patches Five Vulnerabilities Across FortiAP, FortiOS, and Enterprise Products
By Guru Baran
May 12, 2026
Fortinet released security advisories on May 12, 2026, addressing five vulnerabilities spanning its wireless access point controllers, network operating system, and enterprise management platforms, including a critical unauthenticated authorization bypass in FortiSandbox.
Critical Flaw in FortiSandbox
The most severe vulnerability disclosed is CVE-2026-26083 (FG-IR-26-136), a missing authorization flaw affecting FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS.
Rated Critical, this GUI-accessible vulnerability requires no authentication, meaning a remote attacker could potentially access restricted functionality or sensitive sandbox analysis data without any credentials.
Affected versions include FortiSandbox 5.0 and 4.4, FortiSandbox Cloud 24, 23, and 5.0, and FortiSandbox PaaS versions spanning 22.1 through 23.4. The unauthenticated attack surface makes this the highest-priority patch in the batch.
Dual CLI Command Injection in FortiAP
Two separate OS command injection vulnerabilities were disclosed affecting Fortinet’s wireless access point firmware.
CVE-2025-53680 (FG-IR-26-131) involves improper neutralization of special elements in OS commands within the FortiAP CLI, affecting FortiAP 6.4 through 7.6, FortiAP-U 6.2 and 7.0, and FortiAP-W2 7.0 through 7.4.
A second CLI injection flaw, CVE-2025-53870 (FG-IR-26-133), independently affects FortiAP 6.4 through 7.6 and FortiAP-W2 7.0 through 7.4.
Both are rated Medium severity and require authenticated internal access, but successful exploitation could allow an attacker with CLI access to execute arbitrary OS-level commands on the access point hardware.
DoS Risk in FortiAnalyzer and FortiManager API
CVE-2025-67604 (FG-IR-26-137) exposes a use of a potentially dangerous function vulnerability in the API layer of both FortiAnalyzer and FortiManager. Rated Medium, the flaw affects FortiAnalyzer and FortiManager versions 7.0 through 8.0 across both product lines.
An authenticated internal attacker could trigger a denial-of-service condition through the API, potentially disrupting centralized log analysis and network management operations — critical components in enterprise SOC environments.
Out-of-Bounds Write in FortiOS CAPWAP Daemon
CVE-2025-53844 (FG-IR-26-123) is an out-of-bounds write vulnerability residing in the CAPWAP (Control and Provisioning of Wireless Access Points) daemon within FortiOS.
Affecting FortiOS 7.2, 7.4, and 7.6, this flaw could allow an attacker with control over an access point endpoint to send malformed CAPWAP traffic and potentially crash or compromise the FortiOS process.
The vector is listed as “Others/Internal/Authenticated,” suggesting the attack requires a foothold within a trusted network segment or rogue AP scenario.
CVE Product Severity Vector Auth Required
CVE-2026-26083 FortiSandbox / Cloud / PaaS Critical GUI No
CVE-2025-53680 FortiAP, FortiAP-U, FortiAP-W2 Medium CLI Yes
CVE-2025-53870 FortiAP, FortiAP-W2 Medium CLI Yes
CVE-2025-67604 FortiAnalyzer, FortiManager Medium API Yes
CVE-2025-53844 FortiOS Medium CAPWAP Yes
Organizations running affected Fortinet products should prioritize patching CVE-2026-26083 immediately, given its Critical rating and unauthenticated attack surface.
For the remaining medium-severity flaws, security teams should apply available patches during their next maintenance window, restrict CLI and API access to trusted administrators only, and monitor internal network traffic for anomalous CAPWAP or API activity.
Fortinet’s PSIRT advisory page remains the authoritative source for patch version details and workarounds.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
Tags
cyber security
cyber security news
Copy URL
Linkedin
Twitter
ReddIt
Telegram
Guru Baranhttps://cybersecuritynews.com
Gurubaran KS is a cybersecurity analyst, and Journalist with a strong focus on emerging threats and digital defense strategies. He is the Co-Founder and Editor-in-Chief of Cyber Security News, where he leads editorial coverage on global cybersecurity developments.
Trending News
GhostLock Tool Leverages Windows API to Lock File Access Like Ransomware
Hackers Abuse Signed Logitech Installer to Deploy TCLBANKER Banking Trojan
New PamDOORa Backdoor Attacking Linux Systems to Steal SSH Credentials
Open WebUI Vulnerability via File Upload Leads to 1-Click RCE Attack
ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program
Latest News
Cyber Security News
Open WebUI Vulnerability via File Upload Leads to 1-Click RCE Attack
Cyber Security News
Ivanti Patches Multiple Vulnerabilities in Secure Access, Xtraction, vTM and Endpoint Manager
ANY.RUN
No Blind Spots: How Top MSSPs Prevent Incidents withLive Threat Visibility
Cyber Security News
Threat Actors Leverage Vercel’s AI Tools to Mass‑Produce Realistic Phishing Sites
Cyber Security News
Zoom Rooms and Workplace Vulnerabilities Allow Attackers to Escalate Privileges