Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code

FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code

Posted on January 13, 2026January 13, 2026 By CWS

Fortinet has disclosed a essential heap-based buffer overflow vulnerability (CWE-122) within the cw_acd daemon of FortiOS and FortiSwitchManager.

This flaw allows a distant, unauthenticated attacker to execute arbitrary code or instructions by sending specifically crafted requests over the community.

Organizations counting on Fortinet’s firewalls, safe entry service edge (SASE) options, and change administration instruments face excessive threat, particularly in environments with uncovered material interfaces.

Found internally by Fortinet Product Safety Crew member Gwendal Guégniaud, the vulnerability was revealed on January 13, 2026. Whereas no CVE identifier has been assigned but, Fortinet urges quick patching as a result of threat of full-system compromise with out authentication.

A number of FortiOS branches, FortiSASE releases, and FortiSwitchManager variations are impacted. Directors ought to confirm their deployments and comply with the beneficial improve paths utilizing Fortinet’s improve device.

ProductAffected VersionsSolutionFortiOS 7.67.6.0 by way of 7.6.3Upgrade to 7.6.4 or aboveFortiOS 7.47.4.0 by way of 7.4.8Upgrade to 7.4.9 or aboveFortiOS 7.27.2.0 by way of 7.2.11Upgrade to 7.2.12 or aboveFortiOS 7.07.0.0 by way of 7.0.17Upgrade to 7.0.18 or aboveFortiOS 6.46.4.0 by way of 6.4.16Upgrade to six.4.17 or aboveFortiSASE 25.225.2.bAlready remediated in 25.2.cFortiSASE 25.1.a25.1.a.2Migrate to mounted releaseFortiSASE 24.4–22Not affectedN/AFortiSwitchManager 7.27.2.0 by way of 7.2.6Upgrade to 7.2.7 or aboveFortiSwitchManager 7.07.0.0 by way of 7.0.5Upgrade to 7.0.6 or above

Workarounds

Within the absence of patches, Fortinet recommends two mitigations. First, disable “material” entry on interfaces:

textconfig system interface
edit “port1”
set allowaccess ssh https # Take away ‘material’
subsequent
finish

Second, block CAPWAP-CONTROL visitors (UDP ports 5246-5249) by way of local-in insurance policies, permitting solely trusted sources. Outline customized providers, deal with teams, and insurance policies to allow from authorized IPs whereas denying others.

Fortinet advises prioritizing upgrades, monitoring logs for anomalous cw_acd exercise, and segmenting administration interfaces. This vulnerability underscores the continuing want for vigilant patch administration in enterprise networks.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Arbitrary, Attackers, Code, Execute, FortiOS, FortiSwitchManager, Remote, Vulnerability

Post navigation

Previous Post: 8000+ SmarterMail Hosts Vulnerable to RCE Attack
Next Post: Cyber Insights 2026: External Attack Surface Management

Related Posts

How SOCs Detect More Threats without Alert Overload How SOCs Detect More Threats without Alert Overload Cyber Security News
Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Cyber Security News
Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI Cyber Security News
Claude Code Introduces Remote Terminal Control via Mobile Claude Code Introduces Remote Terminal Control via Mobile Cyber Security News
MediaTek Chip Flaw Exposes Android PINs in Seconds MediaTek Chip Flaw Exposes Android PINs in Seconds Cyber Security News
SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark