[CIVN-2026-0035] Remote Code Execution vulnerability in Fortinet

By Published On: January 20, 2026

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution vulnerability in Fortinet 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
FortiSIEM Versions 7.4.0
FortiSIEM Versions 7.3.0 through 7.3.4
FortiSIEM Versions 7.2.0 through 7.2.6
FortiSIEM Versions 7.1.0 through 7.1.8
FortiSIEM Versions 7.0.0 through 7.0.4
FortiSIEM Versions 6.7.0 through 6.7.10
Overview
A vulnerability has been reported in FortiSIEM which could allow an attacker to execute arbitrary code or commands on the target system.
Target Audience:
All organizations and individuals using FortiSIEM product.
Risk Assessment:
Unauthorized command Injection, data loss, or full system compromise.
Impact Assessment:
High potential of arbitrary code execution.
Description
Fortinet is a global cybersecurity company that provides network security solutions, including firewalls, VPNs, and intrusion prevention systems.
Remote Code Execution vulnerability exists in FortiSIEM due to improper neutralization of special elements used in OS commands. An attacker could exploit this vulnerability by injecting specially crafted TCP requests on the targeted system.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code or commands on the target system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://fortiguard.fortinet.com/psirt/FG-IR-25-772
Vendor Information
Fortinet
https://fortiguard.fortinet.com/psirt/FG-IR-25-772
References
Fortinet
https://fortiguard.fortinet.com/psirt/FG-IR-25-772
CVE Name
CVE-2025-64155
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmlvlbsACgkQ3jCgcSdc
ys+T+hAAki1/gzAr9xY3ygWPd/BjC66TKZzX814UylaCkeJJncGXPIIyQKeA8d3j
YLX+CKpamLw/eNxxLZIBI6Ty27n9BoZ3JaGMbRQ//4pDjA6EHpBZx9Xe7H9IJDXI
+7JcA2bl44TmYkCu7cI5u82ouK6BjhuXjmeEy5jTS7OpdCYHAmUPDGyb+IWdcE4J
3YbX3uH6y6hoGuoDD7IwEwG/q/OXKJaiPePBnoAQqirbCPjsLCYeOZl98qa3QlFt
AafraEeeNpATR6GU01zBJVX1+x6FbCZ483KHonCUDpuPbzT87oXyKqCfD3xleNwJ
v8+10a40hkjd21zdFspdUSWi5okP3YZKiJ4l6CkjOUcQK372hqssPe08Hin0wcyi
UVxbKomFw4dsE7rmhgoZFu1pYYHdxeFibiRW6jkNZl4qXTxxBg6M+l/L/KkNJmbO
BmH65HKWeqyHIQc649llQ3psHJSyrG/Tdr1fpJ3D5qUeHH5iXdt3HJSy5XuKOk3O
6g7vaZfOReGxqL0Cc2Zwnz5Q4HJVEZmZmekdk7+tKR+GJadI3TXbvsVFhFZrlgIy
AVkTDv8Kb/cQB70WrXH7MKjK9eaj6XA9lHB7Mz576A77ukUl4+6O50/wmsL3wtNC
6BroqOKSjo5ZVJCkf9PQd1hWtgA5FeKEdQVWnQ6Vtw2pTQpoO0w=
=/+8e
—–END PGP SIGNATURE—–

Share this article