The Fortinetwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.
Confirm whether recent Fortinet activity overlaps with your environment.
Prioritize advisories by MSP-relevance score, severity, and status.
Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.
At a glance
Tracked
96
Active
30
Featured
33
Unique CVEs
1
Most recent entry
Apr 15, 2026, 2:00 AM
Feed refreshes daily · 5:15 a.m. Central
Sources·Fortinet PSIRT RSS, CISA KEV, and NVD
"Most recent entry" is the newest item the upstream feed has published — not our sync time.
Watch items
Recent Fortinet watch items
Showing the 20 most recent items, newest first. Each row links to the official advisory.
20 rows · sorted newest first
Operations view
Out-Of-Bounds Write in administrative interface (FortiWeb CGI daemon)
medium
watchVendor advisory
CVSSv3 Score:
6.7
An out-of-bounds write vulnerability [CWE-787] in FortiWeb CGI daemon may allow a remote privileged attacker to execute arbitrary code or command via crafted HTTP requests.
Revised on 2026-04-15 00:00:00
A missing authentication for critical function vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiOS 6.4 all versions, FortiOS 6.2.9 through 6.2.17 allows attacker to execute unauthorized code or commands via specially crafted packets.
OS Command Injection through API endpoint (an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox)
critical
watchVendor advisory
CVSSv3 Score:
9.1
An Improper Neutralization of Special Elements used in an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox may allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests.
Revised on 2026-04-14 00:00:00
Unauthenticated Authentication bypass and Privilege escalation in FortiSandbox (FortiSandbox JRPC API)
critical
watchVendor advisory
CVSSv3 Score:
9.1
A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.
Revised on 2026-04-14 00:00:00
SQL Injection via API (an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiDDoS-F)
high
watchVendor advisory
CVSSv3 Score:
7.9
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiDDoS-F may allow an authenticated attacker to run arbitrary SQL queries on the database by sending crafted HTTP requests.
Revised on 2026-04-14 00:00:00
Heap-based buffer overflow in oftpd daemon (FortiAnalyzer Cloud oftpd daemon)
high
watchVendor advisory
CVSSv3 Score:
7.3
A heap-based buffer overflow vulnerability [CWE-122] in FortiAnalyzer Cloud oftpd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. Successful exploitation would require a large amount of effort in preparation because of ASLR and network segmentation
Revised on 2026-04-14 00:00:00
CVSSv3 Score:
7.1
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may allow an authenticated attacker to run arbitrary SQL queries on the database via sending crafted requests.
Revised on 2026-04-14 00:00:00
Reflected XSS in Operation Center (FortiSandbox and FortiSandbox Cloud)
medium
watchVendor advisory
CVSSv3 Score:
4.9
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiSandbox and FortiSandbox Cloud may allow an attacker to perform an XSS attack via crafted HTTP requests.
Revised on 2026-04-14 00:00:00
Arbitrary directory delete on vmimages delete feature (FortiSandbox, FortiSandbox Cloud, FortiSandbox PaaS and FortiSandbox Cloud WEB UI)
medium
watchVendor advisory
CVSSv3 Score:
6.2
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiSandbox, FortiSandbox Cloud, FortiSandbox PaaS and FortiSandbox Cloud WEB UI may allow a privileged attacker with super-admin profile and CLI access to delete an arbitrary directory via HTTP crafted requests.
Revised on 2026-04-14 00:00:00
Path Traversal on File Content Extraction connector (FortiSOAR)
medium
watchVendor advisory
CVSSv3 Score:
6.2
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiSOAR may allow an authenticated remote attacker to perform path traversal attack via File Content Extraction actions.
Revised on 2026-04-14 00:00:00
Multiple Stored XSS (FortiSandbox and FortiSandbox Cloud)
medium
watchVendor advisory
CVSSv3 Score:
4.3
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiSandbox and FortiSandbox Cloud may allow a privileged attacker to perform a stored XSS attack via crafted HTTP requests.
Revised on 2026-04-14 00:00:00
Cleartext Credentials in response for API endpoints (FortiSOAR)
medium
watchVendor advisory
CVSSv3 Score:
6.2
A Cleartext Transmission of Sensitive Information vulnerability [CWE-319] in FortiSOAR may allow an authenticated attacker to view cleartext password in response for Secure Message Exchange and Radius queries, if configured
Revised on 2026-04-14 00:00:00
Hardcoded symmetric encryption key for Postgresql (FortiClientEMS)
medium
watchVendor advisory
CVSSv3 Score:
5.2
A use of hard-coded cryptographic key vulnerability [CWE 321] in FortiClientEMS may allow an attacker in possession of an encrypted dump of the database to decrypt it.
Revised on 2026-04-14 00:00:00
Integer Overflow Denial of Service in administrative interface (FortiWeb)
medium
watchVendor advisory
CVSSv3 Score:
4.4
An Integer Overflow or Wraparound vulnerability [CWE-190] in FortiWeb may allow a privileged authenticated attacker to perform a denial of service of the system via crafted HTTP requests.
Revised on 2026-04-14 00:00:00
SSRF via Report template and scheduling (FortiSOAR)
medium
watchVendor advisory
CVSSv3 Score:
4.1
A Server-Side request forgery (SSRF) vulnerability [CWE-918] in FortiSOAR may allow an authenticated attacker to discover services running on local ports via crafted requests.
Revised on 2026-04-14 00:00:00
Clear-text credentials retrievable with IP modification for connectors (a Recoverable Format vulnerability [CWE-257] in FortiSOAR)
medium
watchVendor advisory
CVSSv3 Score:
4.1
A Storing Passwords in a Recoverable Format vulnerability [CWE-257] in FortiSOAR may allow an authenticated remote attacker to retrieve passwords for multiple installed connectors via server address modification in connector configuration.
Revised on 2026-04-14 00:00:00
Stored Cross Site Scripting (XSS) in Reports View page (FortiSOAR)
medium
watchVendor advisory
CVSSv3 Score:
4.4
An Improper neutralization of input during web page generation ('cross-site scripting') vulnerability [CWE-79] in FortiSOAR may allow an authenticated remote attacker to perform a stored cross site scripting (XSS) attack via crafted HTTP Requests.
Revised on 2026-04-14 00:00:00
SQL Injection via JSON RPC API (an SQL command ('SQL injection') [CWE-89] in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager and FortiManager Cloud)
medium
watchVendor advisory
CVSSv3 Score:
6.8
An improper neutralization of special elements used in an SQL command ('SQL injection') [CWE-89] in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager and FortiManager Cloud may allow an authenticated privileged attacker to execute unauthorized code or commands via crafted requests.
Revised on 2026-04-14 00:00:00
2FA request can be replayed without a valid token after one successful request (FortiSOAR web GUI)
medium
watchVendor advisory
CVSSv3 Score:
6.7
An Improper authentication vulnerability [CWE-287] in FortiSOAR web GUI may allow an unauthenticated attacker to bypass authentication via replaying captured 2FA request. The attack requires being able to intercept and decrypt authentication traffic and precise timing to replay the request before token expiration.
Revised on 2026-04-14 00:00:00
Clear-text credentials retrievable with IP modification for LDAP (a Recoverable Format vulnerability [CWE-257] in FortiSOAR)
medium
watchVendor advisory
CVSSv3 Score:
4.1
A Storing Passwords in a Recoverable Format vulnerability [CWE-257] in FortiSOAR may allow an authenticated remote attacker to retrieve Service account password via server address modification in LDAP configuration.
Revised on 2026-04-14 00:00:00
Out-Of-Bounds Write in administrative interface (FortiWeb CGI daemon)
CVSSv3 Score:
6.7
An out-of-bounds write vulnerability [CWE-787] in FortiWeb CGI daemon may allow a remote privileged attacker to execute arbitrary code or command via crafted HTTP requests.
Revised on 2026-04-15 00:00:00
FortiWeb CGI daemon
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
A missing authentication for critical function vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiOS 6.4 all versions, FortiOS 6.2.9 through 6.2.17 allows attacker to execute unauthorized code or commands via specially crafted packets.
fortios
HIGHCVE-2025-53847
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.0% EPSS.
OS Command Injection through API endpoint (an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox)
CVSSv3 Score:
9.1
An Improper Neutralization of Special Elements used in an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox may allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests.
Revised on 2026-04-14 00:00:00
an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox
critical
Elevated
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Unauthenticated Authentication bypass and Privilege escalation in FortiSandbox (FortiSandbox JRPC API)
CVSSv3 Score:
9.1
A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.
Revised on 2026-04-14 00:00:00
FortiSandbox JRPC API
critical
Elevated
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
SQL Injection via API (an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiDDoS-F)
CVSSv3 Score:
7.9
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiDDoS-F may allow an authenticated attacker to run arbitrary SQL queries on the database by sending crafted HTTP requests.
Revised on 2026-04-14 00:00:00
an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiDDoS-F
high
Elevated
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Heap-based buffer overflow in oftpd daemon (FortiAnalyzer Cloud oftpd daemon)
CVSSv3 Score:
7.3
A heap-based buffer overflow vulnerability [CWE-122] in FortiAnalyzer Cloud oftpd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. Successful exploitation would require a large amount of effort in preparation because of ASLR and network segmentation
Revised on 2026-04-14 00:00:00
FortiAnalyzer Cloud oftpd daemon
high
Elevated
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
CVSSv3 Score:
7.1
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may allow an authenticated attacker to run arbitrary SQL queries on the database via sending crafted requests.
Revised on 2026-04-14 00:00:00
an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS
high
Elevated
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Reflected XSS in Operation Center (FortiSandbox and FortiSandbox Cloud)
CVSSv3 Score:
4.9
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiSandbox and FortiSandbox Cloud may allow an attacker to perform an XSS attack via crafted HTTP requests.
Revised on 2026-04-14 00:00:00
FortiSandbox and FortiSandbox Cloud
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Arbitrary directory delete on vmimages delete feature (FortiSandbox, FortiSandbox Cloud, FortiSandbox PaaS and FortiSandbox Cloud WEB UI)
CVSSv3 Score:
6.2
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiSandbox, FortiSandbox Cloud, FortiSandbox PaaS and FortiSandbox Cloud WEB UI may allow a privileged attacker with super-admin profile and CLI access to delete an arbitrary directory via HTTP crafted requests.
Revised on 2026-04-14 00:00:00
FortiSandbox, FortiSandbox Cloud, FortiSandbox PaaS and FortiSandbox Cloud WEB UI
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Path Traversal on File Content Extraction connector (FortiSOAR)
CVSSv3 Score:
6.2
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiSOAR may allow an authenticated remote attacker to perform path traversal attack via File Content Extraction actions.
Revised on 2026-04-14 00:00:00
FortiSOAR
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Multiple Stored XSS (FortiSandbox and FortiSandbox Cloud)
CVSSv3 Score:
4.3
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiSandbox and FortiSandbox Cloud may allow a privileged attacker to perform a stored XSS attack via crafted HTTP requests.
Revised on 2026-04-14 00:00:00
FortiSandbox and FortiSandbox Cloud
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Cleartext Credentials in response for API endpoints (FortiSOAR)
CVSSv3 Score:
6.2
A Cleartext Transmission of Sensitive Information vulnerability [CWE-319] in FortiSOAR may allow an authenticated attacker to view cleartext password in response for Secure Message Exchange and Radius queries, if configured
Revised on 2026-04-14 00:00:00
FortiSOAR
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Hardcoded symmetric encryption key for Postgresql (FortiClientEMS)
CVSSv3 Score:
5.2
A use of hard-coded cryptographic key vulnerability [CWE 321] in FortiClientEMS may allow an attacker in possession of an encrypted dump of the database to decrypt it.
Revised on 2026-04-14 00:00:00
FortiClientEMS
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Integer Overflow Denial of Service in administrative interface (FortiWeb)
CVSSv3 Score:
4.4
An Integer Overflow or Wraparound vulnerability [CWE-190] in FortiWeb may allow a privileged authenticated attacker to perform a denial of service of the system via crafted HTTP requests.
Revised on 2026-04-14 00:00:00
FortiWeb
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
SSRF via Report template and scheduling (FortiSOAR)
CVSSv3 Score:
4.1
A Server-Side request forgery (SSRF) vulnerability [CWE-918] in FortiSOAR may allow an authenticated attacker to discover services running on local ports via crafted requests.
Revised on 2026-04-14 00:00:00
FortiSOAR
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Clear-text credentials retrievable with IP modification for connectors (a Recoverable Format vulnerability [CWE-257] in FortiSOAR)
CVSSv3 Score:
4.1
A Storing Passwords in a Recoverable Format vulnerability [CWE-257] in FortiSOAR may allow an authenticated remote attacker to retrieve passwords for multiple installed connectors via server address modification in connector configuration.
Revised on 2026-04-14 00:00:00
a Recoverable Format vulnerability [CWE-257] in FortiSOAR
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Stored Cross Site Scripting (XSS) in Reports View page (FortiSOAR)
CVSSv3 Score:
4.4
An Improper neutralization of input during web page generation ('cross-site scripting') vulnerability [CWE-79] in FortiSOAR may allow an authenticated remote attacker to perform a stored cross site scripting (XSS) attack via crafted HTTP Requests.
Revised on 2026-04-14 00:00:00
FortiSOAR
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
SQL Injection via JSON RPC API (an SQL command ('SQL injection') [CWE-89] in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager and FortiManager Cloud)
CVSSv3 Score:
6.8
An improper neutralization of special elements used in an SQL command ('SQL injection') [CWE-89] in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager and FortiManager Cloud may allow an authenticated privileged attacker to execute unauthorized code or commands via crafted requests.
Revised on 2026-04-14 00:00:00
an SQL command ('SQL injection') [CWE-89] in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager and FortiManager Cloud
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
2FA request can be replayed without a valid token after one successful request (FortiSOAR web GUI)
CVSSv3 Score:
6.7
An Improper authentication vulnerability [CWE-287] in FortiSOAR web GUI may allow an unauthenticated attacker to bypass authentication via replaying captured 2FA request. The attack requires being able to intercept and decrypt authentication traffic and precise timing to replay the request before token expiration.
Revised on 2026-04-14 00:00:00
FortiSOAR web GUI
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
Clear-text credentials retrievable with IP modification for LDAP (a Recoverable Format vulnerability [CWE-257] in FortiSOAR)
CVSSv3 Score:
4.1
A Storing Passwords in a Recoverable Format vulnerability [CWE-257] in FortiSOAR may allow an authenticated remote attacker to retrieve Service account password via server address modification in LDAP configuration.
Revised on 2026-04-14 00:00:00
a Recoverable Format vulnerability [CWE-257] in FortiSOAR
medium
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. No EPSS.
It is the Fortinet-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.
How should teams use the Fortinet watch page?
Use it to confirm whether current Fortinet issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.
Can ITECS help respond to Fortinet security issues?
Yes. ITECS can help map Fortinet advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.