Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet FortiManager Flaw Risks Unauthorized Command Execution

Fortinet FortiManager Flaw Risks Unauthorized Command Execution

Posted on March 10, 2026 By CWS

Fortinet has revealed a critical vulnerability within its FortiManager platform, posing a risk of unauthorized command execution. This stack-based buffer overflow flaw, identified as CVE-2025-54820, has been given a CVSSv3 severity score of 7.0, indicating a significant threat to network management systems using vulnerable versions of FortiManager.

Details of the Vulnerability

The flaw is located in the fgtupdates service of FortiManager. Remote attackers who are not authenticated can exploit this vulnerability by sending specially crafted requests, potentially leading to unauthorized code execution on the affected systems. However, the exploitation is contingent upon the fgtupdates service being active and requires bypassing existing stack protection methods, which adds complexity to the attack and results in a High rather than Critical severity rating.

Fortinet issued an advisory on March 10, 2026, under the reference FG-IR-26-098. The vulnerability was responsibly disclosed by a researcher from Dbappsecurity Co., Ltd.

Affected Versions and Mitigation Measures

Several versions of FortiManager are confirmed to be affected. Specifically, versions 7.4.0 through 7.4.2 and 7.2.0 through 7.2.10 require upgrades to versions 7.4.3 and 7.2.11, respectively. All versions of FortiManager 6.4 should be migrated to a fixed release. Importantly, FortiManager Cloud does not have this vulnerability, restricting the issue to on-premises setups.

Fortinet advises upgrading to the patched versions as the primary solution. For those unable to update immediately, disabling the fgtupdates service can serve as a temporary workaround. This can be done by removing it from the service access list on relevant interfaces using the CLI configuration.

Security Recommendations

FortiManager is extensively used across enterprise and governmental sectors for centralized management of Fortinet security devices. Vulnerabilities that allow unauthorized remote code execution, even under specific conditions, significantly expand the attack surface for threat actors.

Security teams should conduct an immediate audit of active FortiManager services, apply necessary patches, and vigilantly monitor for unusual access to the fgtupdates service endpoint. The focus on network management platforms by cybercriminals is a growing concern as these systems are often used for lateral movement and establishing persistent access within managed infrastructures.

Stay informed with our regular cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:buffer overflow, CVE-2025-54820, Cybersecurity, Exploit, fgtupdates, FortiManager, Fortinet, Mitigation, network security, remote code execution, security patch, stack protection, unauthorized access, Vulnerability

Post navigation

Previous Post: Ericsson Data Breach Exposes Thousands’ Information
Next Post: Kevin Mandia’s Armadin Secures $190 Million for AI Cybersecurity

Related Posts

Beyond CVEs – Turning Visibility into Action with ASM Beyond CVEs – Turning Visibility into Action with ASM Cyber Security News
Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account Hackers Using Calendly-Themed Phishing Attack to Steal Google Workspace Account Cyber Security News
Cyber Startup Frenetik Launches Patented Deception Technology to Counter the AI Arms Race Cyber Startup Frenetik Launches Patented Deception Technology to Counter the AI Arms Race Cyber Security News
APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators Cyber Security News
BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments Cyber Security News
Don’t Click ‘Unsubscribe’ Links Blindly It May Leads to Loss of Credentials Don’t Click ‘Unsubscribe’ Links Blindly It May Leads to Loss of Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit ZIP File Flaw to Evade Detection
  • Cloudflare Fixes Critical Pingora Vulnerabilities
  • Kevin Mandia’s Armadin Secures $190 Million for AI Cybersecurity
  • Fortinet FortiManager Flaw Risks Unauthorized Command Execution
  • Ericsson Data Breach Exposes Thousands’ Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit ZIP File Flaw to Evade Detection
  • Cloudflare Fixes Critical Pingora Vulnerabilities
  • Kevin Mandia’s Armadin Secures $190 Million for AI Cybersecurity
  • Fortinet FortiManager Flaw Risks Unauthorized Command Execution
  • Ericsson Data Breach Exposes Thousands’ Information

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News