[CIVN-2026-0089] Multiple vulnerabilities in Fortinet products

By Published On: February 13, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple vulnerabilities in Fortinet products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


FortiOS versions 7.6.0 through 7.6.4

FortiSandbox versions 5.0.0 through 5.0.1

FortiSandbox versions 4.4.0 through 4.4.7

FortiSandbox versions 4.2 (all versions)

FortiSandbox versions 4.0 (all versions)

Overview


Multiple vulnerabilities have been identified in Fortinet products that could allow an unauthenticated remote attacker to bypass LDAP authentication mechanisms or execute malicious scripts on the targeted system.


Target Audience:

All organizations and individuals using the affected Fortinet products.


Risk Assessment:

Potential for unauthorized access and execution of malicious scripts due to authentication bypass and improper input handling.


Impact Assessment:

High risk of unauthorized network access, user impersonation, session compromise, and potential exposure of sensitive information.


Description


Fortinet develops enterprise security solutions that provide VPN authentication, policy enforcement, and advanced threat detection capabilities.


These issues stem from improper handling of LDAP authentication requests within the operating system component and insufficient neutralization of user-supplied input in the web-based analysis interface. An attacker may exploit these weaknesses to bypass LDAP authentication controls in Agentless VPN or FSSO configurations and execute malicious scripts through crafted web requests.


Successful exploitation could allow an unauthenticated attacker to gain unauthorized access to protected network resources and perform actions within a victims browser session.


Solution


Apply appropriate updates as mentioned as mentioned by the Vendor:

https://fortiguard.fortinet.com/psirt/FG-IR-25-093


https://fortiguard.fortinet.com/psirt/FG-IR-25-1052



Vendor Information


Fortinet

https://fortiguard.fortinet.com/psirt/FG-IR-25-093

https://fortiguard.fortinet.com/psirt/FG-IR-25-1052


References


 

https://fortiguard.fortinet.com/psirt/FG-IR-25-093

https://fortiguard.fortinet.com/psirt/FG-IR-25-1052


CVE Name

CVE-2025-52436

CVE-2026-22153




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmPQnkACgkQ3jCgcSdc

ys+HDg/8DZyZyVzD5nzSGHT5XWmSfxeAL/zTX6J5VodZ16WDjbjKQqwk0l5cvxjW

l8+jNUO54T1bk/izOQlAAzrQnodjEPUEEanlcDEYiFQWrd9jr+quyWOisSHB0DWm

CQAFExnKrnmihQ6Nq8PgeFFs8b5M1RPzRJlKif+ENciANtb/42e4YXhPmUsWZhXw

8nkmq87kHb+Y8A32ifzojw+s0i/59Pr+kfM7qTJJImSCYHWgaGd314zpC8Q4HQZS

xemO/6IoNLOQ5hIGN529e+OR9l2g+1hhDCM/iflrAXXowkUtFx7O8KNmrGDhXna8

H4uKLUpTwIsVLoszDDyji0+iCIIqy4ttkXe0lzE62hJuR628K4f4+nOn0ii6VG4h

tjZo0/ibpT5y+lbIr8+Z7sGE/eMUze0tYBjexJyKgQ3wAf/BXk5fXL0yh/9mTitZ

aTzEZc/p8QYZV9+03DVhABsqtNcKkXEvFGqRcQD8i7ern6oZPADJWGPWK1vOyvrZ

+wfRT81s72OYARJBgTeDRxhJkcIKGUnbxNbMyQM2d8mmZazbjoz3N9nqtDBtXsFP

BNF52Ody7Tm6PR9l+0fA6DK4tJmClxDi5bU4vS3jnA+yCSgVQXKkBAommJcrhAb1

3s4vphVg2oqaFEFcwhrQXtcDehLFpC3rqApeqA8qspR08Gqaq9Q=

=uk/3

—–END PGP SIGNATURE—–

Share this article