What's Happening?
Fortinet and Ivanti have released patches for a total of 18 vulnerabilities across their product lines, including three critical-severity bugs. Fortinet's advisories cover 11 vulnerabilities, with two critical issues related to code execution. One of these,
CVE-2026-44277, involves improper access control in FortiAuthenticator, while the other, CVE-2026-26083, is a missing authorization flaw in FortiSandbox. Ivanti's advisories detail seven security defects, with the most severe being CVE-2026-8043, an external control of a file name issue in Xtraction. Both companies have stated that there is no evidence of these vulnerabilities being exploited in the wild.
Why It's Important?
The timely patching of these vulnerabilities is crucial for maintaining the security of systems that rely on Fortinet and Ivanti products. Unpatched vulnerabilities can lead to unauthorized access, data breaches, and other security incidents, which can have severe consequences for businesses and their customers. By addressing these issues, Fortinet and Ivanti help protect their clients from potential exploitation and maintain trust in their security solutions. This proactive approach is essential in the cybersecurity industry, where the threat landscape is constantly evolving.
What's Next?
Following the release of these patches, organizations using Fortinet and Ivanti products should prioritize applying these updates to mitigate potential risks. Security teams will need to monitor their systems for any signs of attempted exploitation and ensure that all security measures are up to date. The cybersecurity community will likely continue to scrutinize these patches to ensure their effectiveness and to identify any further vulnerabilities that may need addressing.











