TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

CIS Advisories

Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution

2026-01-13 · Read original ↗

ATT&CK techniques detected

7 predictions
T1190Exploit Public-Facing Application
98%
": initial access ( ta0001 ) technique : exploitation public - facing application ( t1190 ) : - a heap - based buffer overflow vulnerability [ cwe - 122 ] in fortios and fortiswitchmanager cw _ acd daemon may allow a remote unauthenticated attacker to execute arbitrary code or com…"
T1190Exploit Public-Facing Application
98%
"reports of these vulnerabilities being exploited in the wild. systems affected : - fortivoice 7. 2. 0 through 7. 2. 2 - fortivoice 7. 0. 0 through 7. 0. 7 - forticlientems 7. 4. 3 through 7. 4. 4 - forticlientems 7. 4. 0 through 7. 4. 1 - forticlientems 7. 2. 0 through 7. 2. 10 -…"
T1190Exploit Public-Facing Application
95%
"command ( ' sql injection ' ) vulnerability [ cwe - 89 ] in forticlientems may allow an authenticated attacker with at least read - only admin permission to execute unauthorized sql code or commands via crafted http or https requests. ( cve - 2025 - 59922 ) - a server - side requ…"
T1190Exploit Public-Facing Application
95%
"##ger 7. 0. 0 through 7. 0. 5 - fortisandbox 5. 0. 0 through 5. 0. 4 - fortisandbox 4. 4 all versions - fortisandbox 4. 2 all versions - fortisandbox 4. 0 all versions - fortifone 7. 0. 0 through 7. 0. 1 - fortifone 3. 0. 13 through 3. 0. 23 - fortisiem 7. 4. 0 - fortisiem 7. 3. …"
T1190Exploit Public-Facing Application
80%
"product lines. - fortiproxy is a secure web gateway product from fortinet that protects users from internet - borne attacks, enforces compliance, and improves network performance. - forticlientems is a centralized management platform for deploying, configuring, monitoring, and en…"
T1078.001Default Accounts
77%
"of a successful attack. ( m1026 : privileged account management ) - safeguard 4. 7 : manage default accounts on enterprise assets and software : manage default accounts on enterprise assets and software, such as root, administrator, and other pre - configured vendor accounts. exa…"
T1595.002Vulnerability Scanning
58%
"a scap - compliant vulnerability scanning tool. perform scans on a monthly, or more frequent, basis. - safeguard 7. 7 : remediate detected vulnerabilities : remediate detected vulnerabilities in software through processes and tooling on a monthly, or more frequent, basis, based o…"

Summary

Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for arbitrary code execution.

  • FortiSandbox is an advanced threat detection solution from Fortinet that uses sandboxing to analyze suspicious files and network traffic for advanced threats like zero-day malware and ransomware.
  • FortiWeb is a web application firewall (WAF) that protects web applications and APIs from cyberattacks like SQL injection and cross-site scripting, while also helping to meet compliance requirements.
  • FortiVoice is a unified communications solution that combines voice, chat, conferencing, and fax into a single, secure platform for businesses and schools.
  • FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines.
  • FortiProxy is a secure web gateway product from Fortinet that protects users from internet-borne attacks, enforces compliance, and improves network performance.
  • FortiClientEMS is a centralized management platform for deploying, configuring, monitoring, and enforcing security policies across numerous endpoints (computers) running the FortiClient agent.
  • FortiSwitchManager is Fortinet's dedicated, on-premise platform for centrally managing FortiSwitch devices in large deployments.
  • FortiFone is Fortinet's secure, enterprise-grade unified communications solution.

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.