Home Blog Page 59

Multiple authenticated SQL injection via extraParam

CVSSv3 Score: 6.8 An improper neutralization of special elements used in an SQL command ('SQL injection') in FortiVoice may allow an authenticated privileged attacker to execute unauthorized code or commands via crafted requests. Revised on 2025-12-09 00:00:00 - Read more

Multiple authenticated OS Command Injections via API

CVSSv3 Score: 6.7 An OS command injection vulnerabtility in FortiExtender API may allow an authenticated attacker to execute unauthorized code or commands via a specific HTTP request. Revised on 2025-12-09 00:00:00 - Read more

Multiple Fortinet Products’ FortiCloud SSO Login Authentication Bypass

CVSSv3 Score: 9.1 An Improper Verification of Cryptographic Signature vulnerability in FortiOS, FortiWeb, FortiProxy and FortiSwitchManager mayallow an unauthenticated attacker to bypass the FortiCloud SSO loginauthentication via a crafted SAML message, if that feature is enabled on the device.Please note that the FortiCloud SSO login feature is not enabled in default factory settings. However, when an...

Missing authorization on log access

CVSSv3 Score: 2.6 A Direct Request ('Forced Browsing') vulnerability in FortiAuthenticator logs may allow an authenticated attacker with at least sponsor permissions to read and download device logs via accessing specific endpoints. Revised on 2025-12-09 00:00:00 - Read more

Insufficient Session Expiration in SSLVPN

CVSSv3 Score: 5.3 An Insufficient Session Expiration vulnerability in FortiOS SSLVPN may allow an attacker to maintain access to network resources via an active session not terminated after a user's password change under particular conditions outside of the attacker's control Revised on 2025-12-09 00:00:00 - Read more

Insertion of sensitive information into REST API logs

CVSSv3 Score: 6.3 An insertion of sensitive information into log file vulnerability in FortiOS, FortiProxy, FortiPAM and FortiSRA may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration). Revised on 2025-12-09 00:00:00 - Read more

Incorrect authorization in multi-vdom environment

CVSSv3 Score: 6.4 An Incorrect Authorization vulnerability in FortiPortal may allow an authenticated attacker to reboot a shared FortiGate device via crafted HTTP requests. Revised on 2025-12-09 00:00:00 - Read more

Current password requirement bypass for self password change

CVSSv3 Score: 6.5 An Unverified Password Change vulnerability in FortiSOAR may allow an attacker who gained access to a victim's user account to reset the account credentials without being prompted for the account's password Revised on 2025-12-09 00:00:00 - Read more

Capacity to use password hashes instead of password for authentication

CVSSv3 Score: 4.4 A use of password hash instead of password for authentication vulnerability in FortiWeb may allow an unauthenticated attacker to use the hash in place of the password to authenticate via crafted HTTP/HTTPS requests. Revised on 2025-12-09 00:00:00 - Read more

Capacity to forge authentication cookies

CVSSv3 Score: 7.1 A reliance on cookie without validation or integrity checking vulnerability in FortiWeb may allow an unauthenticated attacker to execute arbitrary operations on the system via crafted HTTP or HTTPS request via forged cookies requiring knowledge of the FortiWeb serial number.FortiAppSec Cloud is NOT impacted by this vulnerability. Revised on 2025-12-09 00:00:00...

Latest article

Vulnerability monitoring service secures public-sector websites faster

An automated scanning system has cut the time it takes to fix cybersecurity vulnerabilities across public sector IT systems, reducing...

Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely

A high-severity security vulnerability has been discovered in Google Chrome’s integrated Gemini AI assistant, exposing users to unauthorized camera and microphone access, local file...

2nd March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 2nd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Wynn Resorts, a...

Chrome Unveils Plan For Quantum-Safe HTTPS Certificates

Google Chrome initiates quantum-resistant measures via Merkle Tree Certificates to secure HTTPS - Read more