Fortinet, Ivanti Patch Critical Vulnerabilities
Fortinet and Ivanti patch 18 vulnerabilities including three critical code execution flaws.
Summary
Fortinet released 11 advisories covering 11 vulnerabilities, including two critical-severity remote code execution bugs in FortiAuthenticator (CVE-2026-44277) and FortiSandbox (CVE-2026-26083), both with CVSS 9.1 scores. Ivanti patched 7 vulnerabilities across four products, with the most severe being CVE-2026-8043 (CVSS 9.6) in Xtraction allowing arbitrary file read/write. Neither vendor reported active exploitation of the patched flaws in the wild.
Full text
Fortinet and Ivanti on Tuesday announced patches for 18 vulnerabilities across their product portfolios, including three critical-severity bugs. Fortinet published 11 advisories describing as many bugs, including two dealing with critical-severity code execution security defects. Tracked as CVE-2026-44277 (CVSS score of 9.1), the first of them is an improper access control issue in FortiAuthenticator that could be exploited remotely, without authentication, via crafted requests. “FortiAuthenticator Cloud is not impacted by the issue, and hence customers do not need to perform any action,” the company says. The second, tracked as CVE-2026-26083 (CVSS score of 9.1), is a missing authorization weakness affecting FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS WEB UI. According to Fortinet, remote, unauthenticated attackers could send crafted HTTP requests to the vulnerable appliances to achieve code or command execution.Advertisement. Scroll to continue reading. On Tuesday, Fortinet also resolved a high-severity out-of-bounds write vulnerability (CVE-2025-53844) in the FortiOS capwap daemon that could allow attackers to execute code on FortiGate devices. The attacker needs to control an authenticated FortiAP FortiExtender or FortiSwitch, the company says. Fortinet also rolled out fixes for seven medium-severity flaws affecting FortiDeceptor WEB UI, FortiAP, FortiAP-U, FortiAP-W2 CLI, FortiAnalyzer, FortiManager, FortiTokenAndroid, FortiMail, and FortiNDR. Ivanti published four advisories on Tuesday, detailing seven security defects impacting Ivanti Secure Access Client, Xtraction, Virtual Traffic Manager, and Endpoint Manager (EPM). The most severe of these is CVE-2026-8043 (CVSS score of 9.6), described as an external control of a file name issue in Xtraction that could be exploited remotely to read sensitive files and write arbitrary HTML files to a web directory. The company also resolved four high-severity vulnerabilities, including SQL injection and incorrect permissions assignment flaws in EPM, an OS command injection in Virtual Traffic Manager, and a race condition in Secure Access Client. Successful exploitation of these bugs could lead to privilege escalation and remote code execution, the company says. Both Fortinet and Ivanti said they were not aware of any of the patched vulnerabilities being exploited in the wild. On Tuesday, Zoom rolled out patches for three security defects, including two high-severity issues in Rooms for Windows and Workplace VDI Plugin for Windows that could lead to privilege escalation. Related: Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities Related: ICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISA Related: Microsoft Patches 137 Vulnerabilities Related: Adobe Patches 52 Vulnerabilities in 10 Products Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Microsoft Patches 137 VulnerabilitiesAdobe Patches 52 Vulnerabilities in 10 ProductsWhite Circle Raises $11 Million for AI Control PlatformWest Pharmaceutical Services Hit by Disruptive Ransomware AttackSAP Patches Critical S/4HANA, Commerce VulnerabilitiesTanStack, Mistral AI, UiPath Hit in Fresh Supply Chain AttackSkoda Data Breach Hits Online Shop CustomersSailPoint Discloses GitHub Repository Hack Latest News Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own CodeSweet Security Launches Agentic AI Red Teaming to Counter ‘Mythos Moment’Webinar Today: ROI for Cyber-Physical Security ProgramsGovernment to Scrutinize Instructure Over Canvas Disruption, Data Breach716,000 Impacted by OpenLoop Health Data BreachMicrosoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesChipmaker Patch Tuesday: Intel and AMD Patch 70 VulnerabilitiesHundreds of Malicious Packages Force RubyGems to Suspend Registrations Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email
Indicators of Compromise
- cve — CVE-2026-44277
- cve — CVE-2026-26083
- cve — CVE-2025-53844
- cve — CVE-2026-8043