Home Blog Page 21

SSL-VPN Symlink Persistence Patch Bypass

CVSSv3 Score: 5.3 An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in FortiOS SSL-VPN may allow a remote unauthenticated attacker to bypass the patch developed for the symbolic link persistency mechanism observed in some post-exploit cases, via crafted HTTP requests. An attacker would need first to have compromised the product via another vulnerability,...

Request smuggling attack in FortiOS GUI

CVSSv3 Score: 5.2 An HTTP request smuggling vulnerability in FortiOS may allow an unauthenticated attacker to smuggle an unlogged http request through the firewall policies via a specially crafted header Revised on 2026-02-10 00:00:00 - Read more

Missing authorization on CSV user import

CVSSv3 Score: 6.8 A missing authorization vulnerability in FortiAuthenticator may allow a read-only admin to make modification to local users via a file upload to an unprotected endpoint. Revised on 2026-02-10 00:00:00 - Read more

LDAP authentication bypass in Agentless VPN and FSSO

CVSSv3 Score: 7.5 An Authentication Bypass by Primary Weakness vulnerability in FortiOS fnbamd may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FSSO policy, under specific LDAP server configuration. Revised on 2026-02-10 00:00:00 - Read more

Format String Vulnerability in CAPWAP fast-failover mode

CVSSv3 Score: 6.7 A Use of Externally-Controlled Format String vulnerability in FortiGate may allow an authenticated admin to execute unauthorized code or commands via specifically crafted configuration. Revised on 2026-02-10 00:00:00 - Read more

Firewall policy bypass in FSSO Terminal Services Agent

CVSSv3 Score: 3.8 An Improper Verification of Source of a Communication Channel vulnerability in FortiOS FSSO Terminal Services Agent may allow an authenticated user with knowledge of FSSO policy configurations to gain unauthorized access to protected network resources via crafted requests. Revised on 2026-02-10 00:00:00 - Read more

Arbitrary XML file write in FCConfig

CVSSv3 Score: 6.4 An Improper Link Resolution Before File Access vulnerability in FortiClient Windows may allow a local low-privilege attacker to perform an arbitrary file write with elevated permissions via crafted named pipe messages. Revised on 2026-02-10 00:00:00 - Read more

CVE-2026-21519 Desktop Window Manager Elevation of Privilege Vulnerability

Access of resource using incompatible type ('type confusion') in Desktop Window Manager allows an authorized attacker to elevate privileges locally. - Read more

5 Key Takeaways from The New Era of Phishing: Threats Built in the Age of AI

Artificial intelligence has transformed how organizations operate—and threat actors are moving just as quickly. In Cofense’s recent webinar, The New Era of Phishing: Threats Built in the Age of AI, Cofense Chief Security Officer Josh Bartolomie joined threat experts Chance Caldwell and Max Gannon to break down the most important phishing trends emerging from real-world attack data.Phishing isn’t slowing...

Latest article

2025 FINMA ISAE 3000 Type II attestation report available with 183 services in scope

Amazon Web Services (AWS) is pleased to announce the issuance of the Swiss Financial Market Supervisory Authority (FINMA) Type II attestation report...

Vulnerability monitoring service secures public-sector websites faster

An automated scanning system has cut the time it takes to fix cybersecurity vulnerabilities across public sector IT systems, reducing...

Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely

A high-severity security vulnerability has been discovered in Google Chrome’s integrated Gemini AI assistant, exposing users to unauthorized camera and microphone access, local file...

2nd March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 2nd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Wynn Resorts, a...