Fortinet threat watch

PSIRT watch for FortiGate, FortiManager, FortiOS, and related products.

Vendor watch hub

What this page covers

The Fortinetwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Fortinet activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

96

Active

30

Featured

33

Unique CVEs

1

Most recent entry

Apr 15, 2026, 2:00 AM

Feed refreshes daily · 5:15 a.m. Central

Sources·Fortinet PSIRT RSS, CISA KEV, and NVD

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Fortinet watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

Out-Of-Bounds Write in administrative interface (FortiWeb CGI daemon)

medium
watchVendor advisory

CVSSv3 Score: 6.7 An out-of-bounds write vulnerability [CWE-787] in FortiWeb CGI daemon may allow a remote privileged attacker to execute arbitrary code or command via crafted HTTP requests. Revised on 2026-04-15 00:00:00

Apr 15, 2026, 2:00 AMOfficial source

fortios vulnerability (CVE-2025-53847)

HIGH
watchNVDCVE-2025-53847

A missing authentication for critical function vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiOS 6.4 all versions, FortiOS 6.2.9 through 6.2.17 allows attacker to execute unauthorized code or commands via specially crafted packets.

Apr 14, 2026, 11:16 AMOfficial source

OS Command Injection through API endpoint (an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox)

critical
watchVendor advisory

CVSSv3 Score: 9.1 An Improper Neutralization of Special Elements used in an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox may allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Unauthenticated Authentication bypass and Privilege escalation in FortiSandbox (FortiSandbox JRPC API)

critical
watchVendor advisory

CVSSv3 Score: 9.1 A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

SQL Injection via API (an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiDDoS-F)

high
watchVendor advisory

CVSSv3 Score: 7.9 An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiDDoS-F may allow an authenticated attacker to run arbitrary SQL queries on the database by sending crafted HTTP requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Heap-based buffer overflow in oftpd daemon (FortiAnalyzer Cloud oftpd daemon)

high
watchVendor advisory

CVSSv3 Score: 7.3 A heap-based buffer overflow vulnerability [CWE-122] in FortiAnalyzer Cloud oftpd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. Successful exploitation would require a large amount of effort in preparation because of ASLR and network segmentation Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Multiple SQL Injections (an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS)

high
watchVendor advisory

CVSSv3 Score: 7.1 An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may allow an authenticated attacker to run arbitrary SQL queries on the database via sending crafted requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Reflected XSS in Operation Center (FortiSandbox and FortiSandbox Cloud)

medium
watchVendor advisory

CVSSv3 Score: 4.9 An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiSandbox and FortiSandbox Cloud may allow an attacker to perform an XSS attack via crafted HTTP requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Arbitrary directory delete on vmimages delete feature (FortiSandbox, FortiSandbox Cloud, FortiSandbox PaaS and FortiSandbox Cloud WEB UI)

medium
watchVendor advisory

CVSSv3 Score: 6.2 An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiSandbox, FortiSandbox Cloud, FortiSandbox PaaS and FortiSandbox Cloud WEB UI may allow a privileged attacker with super-admin profile and CLI access to delete an arbitrary directory via HTTP crafted requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Path Traversal on File Content Extraction connector (FortiSOAR)

medium
watchVendor advisory

CVSSv3 Score: 6.2 An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiSOAR may allow an authenticated remote attacker to perform path traversal attack via File Content Extraction actions. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Multiple Stored XSS (FortiSandbox and FortiSandbox Cloud)

medium
watchVendor advisory

CVSSv3 Score: 4.3 An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiSandbox and FortiSandbox Cloud may allow a privileged attacker to perform a stored XSS attack via crafted HTTP requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Cleartext Credentials in response for API endpoints (FortiSOAR)

medium
watchVendor advisory

CVSSv3 Score: 6.2 A Cleartext Transmission of Sensitive Information vulnerability [CWE-319] in FortiSOAR may allow an authenticated attacker to view cleartext password in response for Secure Message Exchange and Radius queries, if configured Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Hardcoded symmetric encryption key for Postgresql (FortiClientEMS)

medium
watchVendor advisory

CVSSv3 Score: 5.2 A use of hard-coded cryptographic key vulnerability [CWE 321] in FortiClientEMS may allow an attacker in possession of an encrypted dump of the database to decrypt it. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Integer Overflow Denial of Service in administrative interface (FortiWeb)

medium
watchVendor advisory

CVSSv3 Score: 4.4 An Integer Overflow or Wraparound vulnerability [CWE-190] in FortiWeb may allow a privileged authenticated attacker to perform a denial of service of the system via crafted HTTP requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

SSRF via Report template and scheduling (FortiSOAR)

medium
watchVendor advisory

CVSSv3 Score: 4.1 A Server-Side request forgery (SSRF) vulnerability [CWE-918] in FortiSOAR may allow an authenticated attacker to discover services running on local ports via crafted requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Clear-text credentials retrievable with IP modification for connectors (a Recoverable Format vulnerability [CWE-257] in FortiSOAR)

medium
watchVendor advisory

CVSSv3 Score: 4.1 A Storing Passwords in a Recoverable Format vulnerability [CWE-257] in FortiSOAR may allow an authenticated remote attacker to retrieve passwords for multiple installed connectors via server address modification in connector configuration. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Stored Cross Site Scripting (XSS) in Reports View page (FortiSOAR)

medium
watchVendor advisory

CVSSv3 Score: 4.4 An Improper neutralization of input during web page generation ('cross-site scripting') vulnerability [CWE-79] in FortiSOAR may allow an authenticated remote attacker to perform a stored cross site scripting (XSS) attack via crafted HTTP Requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

SQL Injection via JSON RPC API (an SQL command ('SQL injection') [CWE-89] in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager and FortiManager Cloud)

medium
watchVendor advisory

CVSSv3 Score: 6.8 An improper neutralization of special elements used in an SQL command ('SQL injection') [CWE-89] in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager and FortiManager Cloud may allow an authenticated privileged attacker to execute unauthorized code or commands via crafted requests. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

2FA request can be replayed without a valid token after one successful request (FortiSOAR web GUI)

medium
watchVendor advisory

CVSSv3 Score: 6.7 An Improper authentication vulnerability [CWE-287] in FortiSOAR web GUI may allow an unauthenticated attacker to bypass authentication via replaying captured 2FA request. The attack requires being able to intercept and decrypt authentication traffic and precise timing to replay the request before token expiration. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Clear-text credentials retrievable with IP modification for LDAP (a Recoverable Format vulnerability [CWE-257] in FortiSOAR)

medium
watchVendor advisory

CVSSv3 Score: 4.1 A Storing Passwords in a Recoverable Format vulnerability [CWE-257] in FortiSOAR may allow an authenticated remote attacker to retrieve Service account password via server address modification in LDAP configuration. Revised on 2026-04-14 00:00:00

Apr 14, 2026, 2:00 AMOfficial source

Related vendors

Other security vendors in the radar

Vendor watch FAQ

Common questions

What is the Fortinet threat watch page?

It is the Fortinet-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Fortinet watch page?

Use it to confirm whether current Fortinet issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Fortinet security issues?

Yes. ITECS can help map Fortinet advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.