
[CIVN-2026-0089] Multiple vulnerabilities in Fortinet products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple vulnerabilities in Fortinet products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
FortiOS versions 7.6.0 through 7.6.4
FortiSandbox versions 5.0.0 through 5.0.1
FortiSandbox versions 4.4.0 through 4.4.7
FortiSandbox versions 4.2 (all versions)
FortiSandbox versions 4.0 (all versions)
Overview
Multiple vulnerabilities have been identified in Fortinet products that could allow an unauthenticated remote attacker to bypass LDAP authentication mechanisms or execute malicious scripts on the targeted system.
Target Audience:
All organizations and individuals using the affected Fortinet products.
Risk Assessment:
Potential for unauthorized access and execution of malicious scripts due to authentication bypass and improper input handling.
Impact Assessment:
High risk of unauthorized network access, user impersonation, session compromise, and potential exposure of sensitive information.
Description
Fortinet develops enterprise security solutions that provide VPN authentication, policy enforcement, and advanced threat detection capabilities.
These issues stem from improper handling of LDAP authentication requests within the operating system component and insufficient neutralization of user-supplied input in the web-based analysis interface. An attacker may exploit these weaknesses to bypass LDAP authentication controls in Agentless VPN or FSSO configurations and execute malicious scripts through crafted web requests.
Successful exploitation could allow an unauthenticated attacker to gain unauthorized access to protected network resources and perform actions within a victims browser session.
Solution
Apply appropriate updates as mentioned as mentioned by the Vendor:
https://fortiguard.fortinet.com/psirt/FG-IR-25-093
https://fortiguard.fortinet.com/psirt/FG-IR-25-1052
Vendor Information
Fortinet
https://fortiguard.fortinet.com/psirt/FG-IR-25-093
https://fortiguard.fortinet.com/psirt/FG-IR-25-1052
References
https://fortiguard.fortinet.com/psirt/FG-IR-25-093
https://fortiguard.fortinet.com/psirt/FG-IR-25-1052
CVE Name
CVE-2025-52436
CVE-2026-22153
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=uk/3
—–END PGP SIGNATURE—–


