Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests

Posted on January 13, 2026January 13, 2026 By CWS

Fortinet disclosed a Server-Facet Request Forgery (SSRF) vulnerability in its FortiSandbox equipment on January 13, 2026, urging customers to replace amid dangers of inner community proxied requests.

Tracked as CVE-2025-67685 (FG-IR-25-783), the flaw resides within the GUI part and stems from CWE-918, enabling authenticated attackers to craft HTTP requests that proxy site visitors to inner plaintext endpoints solely.

With a CVSSv3 rating of three.4 (AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N), Fortinet charges the difficulty as low severity, tied to improper entry management.

Attackers want high-privilege entry, limiting exploitation to insiders or compromised admin accounts. No proof of energetic exploits exists as of publication, however the vulnerability might expose delicate inner companies in air-gapped or segmented environments.

FortiSandbox SSRF Vulnerability

The SSRF arises from insufficient enter validation within the GUI console, permitting request forging to localhost or inner IPs over HTTP/HTTPS plaintext.

Fortinet emphasizes that limiting to non-TLS endpoints reduces the blast radius, however proxying can leak metadata or allow additional pivots in misconfigured setups. Found by Jason McFadyen of Development Micro’s Zero Day Initiative beneath accountable disclosure, the bug impacts older variations of FortiSandbox.

No indicators of compromise (IOCs) had been offered, however admins ought to audit GUI logs for anomalous inner fetches since January 2026.

Affected Variations and Remediation

Model BranchAffected ReleasesSolution5.05.0.0 by way of 5.0.4Upgrade to five.0.5 or above4.4All versionsMigrate to fastened release4.2All versionsMigrate to fastened release4.0All versionsMigrate to fastened launch

Fortinet recommends instant upgrades through the FortiGuard portal. Organizations working legacy FortiSandbox ought to prioritize migration, as end-of-support for FortiSandbox 4.x approaches.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacker, Crafted, FortiSandbox, HTTP, Internal, Proxy, Requests, SSRF, Traffic, Vulnerability

Post navigation

Previous Post: Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
Next Post: Microsoft Patch Tuesday January 2026

Related Posts

Nessus Windows Vulnerabilities Allow Overwrite of Arbitrary Local System Files Cyber Security News
Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks Cyber Security News
Threat Actors Testing Modified and Highly Obfuscated Version of Shai Hulud Strain Cyber Security News
Google Cloud and Cloudflare Suffers Massive Widespread Outages Cyber Security News
AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods Cyber Security News
AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engine’s Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities
  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities
  • Microsoft Patch Tuesday January 2026
  • FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests
  • Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
  • Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark