[CIVN-2026-0019] Remote Code Execution Vulnerabilities in Fortinet Products

By Published On: January 14, 2026

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerabilities in Fortinet Products 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
FortiClientEMS
FortiClientEMS 7.0 (all versions)
FortiClientEMS 7.2.0 through 7.2.10
FortiClientEMS 7.4.0 through 7.4.1
FortiClientEMS 7.4.3 through 7.4.4
FortiOS
FortiOS 6.4.0 through 6.4.16
FortiOS 7.0.0 through 7.0.17
FortiOS 7.2.0 through 7.2.11
FortiOS 7.4.0 through 7.4.8
FortiOS 7.6.0 through 7.6.3
FortiSwitchManager
FortiSwitchManager 7.0.0 through 7.0.5
FortiSwitchManager 7.2.0 through 7.2.6
FortiSASE
FortiSASE 25.1.a
FortiSASE 25.2.b
Overview
Multiple vulnerabilities have been reported in Fortinet products. A remote or authenticated attacker could exploit these vulnerabilities to execute arbitrary code or unauthorized commands on the targeted system.
Target Audience:
All organizations & individuals using affected Fortinet products
Risk Assessment:
High risk of unauthorized access, remote code execution and system compromise.
Impact Assessment:
Potential for data theft, service disruption, or complete compromise of affected systems.
Description
Fortinet is a global cybersecurity company that provides network security solutions, including firewalls, VPNs, and intrusion prevention systems.
Multiple vulnerabilities have been reported in Fortinet products, attributed to a heap-based buffer overflow in the FortiOS and FortiSwitchManager and improper neutralization of special elements used in an SQL command (‘SQL Injection’) in FortiClientEMS.
Successful exploitation of these vulnerabilities could allow a remote or authenticated attacker to execute arbitrary code or commands on the targeted system.
Solution
Apply appropriate updates as mentioned in:
https://fortiguard.fortinet.com/psirt/FG-IR-25-084
https://fortiguard.fortinet.com/psirt/FG-IR-25-735
Vendor Information
Fortinet
https://www.fortinet.com/
https://fortiguard.fortinet.com/
References
 
https://fortiguard.fortinet.com/psirt/FG-IR-25-084
https://fortiguard.fortinet.com/psirt/FG-IR-25-735
CVE Name
CVE-2025-25249
CVE-2025-59922
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=LHGY
—–END PGP SIGNATURE—–

Share this article