What's Happening?
Fortinet has released 26 advisories detailing 27 vulnerabilities across its products, including two critical-severity flaws in FortiSandbox. The first critical vulnerability, CVE-2026-39813, impacts the FortiSandbox JRPC API and could allow attackers
to bypass authentication. The second, CVE-2026-39808, is an OS command injection issue that can be exploited for arbitrary code or command execution. Both vulnerabilities have a CVSS score of 9.1 and can be exploited without authentication via specially crafted HTTP requests. Additionally, Fortinet patched CVE-2026-22828, a high-severity buffer overflow vulnerability in FortiAnalyzer Cloud, which could be exploited for remote code execution or arbitrary command execution. The company also addressed two high-severity SQL injection bugs in FortiDDoS-F and FortiClientEMS, requiring authentication to exploit. Fortinet has not reported any of these vulnerabilities being exploited in the wild.
Why It's Important?
The patching of these vulnerabilities is crucial for maintaining the security of Fortinet's products, which are widely used in various industries. The critical vulnerabilities in FortiSandbox could potentially allow unauthorized access and control over systems, posing significant risks to organizations relying on these products for security. By addressing these issues, Fortinet helps prevent potential exploitation that could lead to data breaches, system downtime, and financial losses. The proactive approach in releasing patches underscores the importance of cybersecurity vigilance and the need for organizations to regularly update their systems to protect against emerging threats.












