Fortinet's sandbox product contains two critical vulnerabilities that can be exploited by unauthenticated attackers to bypass login credentials or execute arbitrary code on vulnerable systems. These bugs pose a significant threat to system security, as they can be leveraged over HTTP without requiring any authentication. Although there are currently no reported instances of active exploitation, the presence of these vulnerabilities underscores the need for prompt patching to prevent potential attacks. The vulnerabilities in question are particularly concerning due to their potential for unauthorized access and code execution, which could lead to significant system compromise. As a result, administrators should prioritize applying the necessary patches to mitigate these risks, especially given the history of Fortinet vulnerabilities being targeted by attackers1. This highlights the importance of keeping systems up to date with the latest security patches to prevent exploitation of known vulnerabilities.
Patch these critical Fortinet sandbox bugs that let attackers bypass login, run commands over HTTP
⚡ High Priority
Why This Matters
Two critical bugs in Fortinet's sandbox could allow unauthenticated attackers to bypass authentication or execute unauthorized code on vulnerable systems.…
References
- The Register. (2026, April 15). Patch these critical Fortinet sandbox bugs that let attackers bypass login, run commands over HTTP. The Register. https://go.theregister.com/feed/www.theregister.com/2026/04/15/critical_fortinet_sandbox_bugs/
Original Source
The Register
Read original →