Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Fortinet Patches Five Vulnerabilities in Forti Across FortiAP
May 12, 2026
Home/CyberSecurity News/Fortinet Patches Five Vulnerabilities in Forti Across FortiAP
CyberSecurity News

Fortinet Patches Five Vulnerabilities in Forti Across FortiAP

Fortinet has released security advisories to address five vulnerabilities impacting its wireless access point controllers, network operating system, and enterprise management platforms. Issued on May...

Jennifer sherman
Jennifer sherman
May 12, 2026 2 Min Read
2 0

Fortinet has released security advisories to address five vulnerabilities impacting its wireless access point controllers, network operating system, and enterprise management platforms. Issued on May 12, 2026, these advisories include a critical patch for an unauthenticated authorization bypass in FortiSandbox.

Table Of Content

  • Critical Flaw in FortiSandbox
  • Dual CLI Command Injection in FortiAP
  • DoS Risk in FortiAnalyzer and FortiManager API
  • Out-of-Bounds Write in FortiOS CAPWAP Daemon
  • Vulnerability Summary

Critical Flaw in FortiSandbox

The most severe vulnerability disclosed is CVE-2026-26083 (FG-IR-26-136), a missing authorization flaw (CWE-862) affecting FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS.

Rated Critical, this GUI-accessible vulnerability requires no authentication, meaning a remote attacker could potentially access restricted functionality or sensitive sandbox analysis data without any credentials.

Affected versions include FortiSandbox 5.0 and 4.4, FortiSandbox Cloud 24, 23, and 5.0, and FortiSandbox PaaS versions spanning 22.1 through 23.4. The unauthenticated attack surface makes this the highest-priority patch in the batch.

Dual CLI Command Injection in FortiAP

Two separate OS command injection vulnerabilities were disclosed affecting Fortinet’s wireless access point firmware.

CVE-2025-53680 (FG-IR-26-131) involves improper neutralization of special elements in OS commands (CWE-78) within the FortiAP CLI, affecting FortiAP 6.4 through 7.6, FortiAP-U 6.2 and 7.0, and FortiAP-W2 7.0 through 7.4.

A second CLI injection flaw, CVE-2025-53870 (FG-IR-26-133), independently affects FortiAP 6.4 through 7.6 and FortiAP-W2 7.0 through 7.4.

Both are rated Medium severity and require authenticated internal access, but successful exploitation could allow an attacker with CLI access to execute arbitrary OS-level commands on the access point hardware.

DoS Risk in FortiAnalyzer and FortiManager API

CVE-2025-67604 (FG-IR-26-137) exposes a use of a potentially dangerous function vulnerability (CWE-676) in the API layer of both FortiAnalyzer and FortiManager. Rated Medium, the flaw affects FortiAnalyzer and FortiManager versions 7.0 through 8.0 across both product lines.

An authenticated internal attacker could trigger a denial-of-service condition through the API, potentially disrupting centralized log analysis and network management operations — critical components in enterprise SOC environments.

Out-of-Bounds Write in FortiOS CAPWAP Daemon

CVE-2025-53844 (FG-IR-26-123) is an out-of-bounds write vulnerability (CWE-787) residing in the CAPWAP (Control and Provisioning of Wireless Access Points) daemon within FortiOS.

Affecting FortiOS 7.2, 7.4, and 7.6, this flaw could allow an attacker with control over an access point endpoint to send malformed CAPWAP traffic and potentially crash or compromise the FortiOS process.

The vector is listed as “Others/Internal/Authenticated,” suggesting the attack requires a foothold within a trusted network segment or rogue AP scenario.

Vulnerability Summary

CVE Product Severity Vector Auth Required
CVE-2026-26083 FortiSandbox / Cloud / PaaS Critical GUI No
CVE-2025-53680 FortiAP, FortiAP-U, FortiAP-W2 Medium CLI Yes
CVE-2025-53870 FortiAP, FortiAP-W2 Medium CLI Yes
CVE-2025-67604 FortiAnalyzer, FortiManager Medium API Yes
CVE-2025-53844 FortiOS Medium CAPWAP Yes

Organizations running affected Fortinet products should prioritize patching CVE-2026-26083 immediately, given its Critical rating and unauthenticated attack surface.

For the remaining medium-severity flaws, security teams should apply available patches during their next maintenance window, restrict CLI and API access to trusted administrators only, and monitor internal network traffic for anomalous CAPWAP or API activity.

Fortinet’s PSIRT advisory page remains the authoritative source for patch version details and workarounds.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Top MSSPs Prevent Incidents with Live Threat Visibility

Next Post

Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us