Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet FortiManager Flaw Risks Unauthorized Command Execution

Fortinet FortiManager Flaw Risks Unauthorized Command Execution

Posted on March 10, 2026 By CWS

Fortinet has revealed a critical vulnerability within its FortiManager platform, posing a risk of unauthorized command execution. This stack-based buffer overflow flaw, identified as CVE-2025-54820, has been given a CVSSv3 severity score of 7.0, indicating a significant threat to network management systems using vulnerable versions of FortiManager.

Details of the Vulnerability

The flaw is located in the fgtupdates service of FortiManager. Remote attackers who are not authenticated can exploit this vulnerability by sending specially crafted requests, potentially leading to unauthorized code execution on the affected systems. However, the exploitation is contingent upon the fgtupdates service being active and requires bypassing existing stack protection methods, which adds complexity to the attack and results in a High rather than Critical severity rating.

Fortinet issued an advisory on March 10, 2026, under the reference FG-IR-26-098. The vulnerability was responsibly disclosed by a researcher from Dbappsecurity Co., Ltd.

Affected Versions and Mitigation Measures

Several versions of FortiManager are confirmed to be affected. Specifically, versions 7.4.0 through 7.4.2 and 7.2.0 through 7.2.10 require upgrades to versions 7.4.3 and 7.2.11, respectively. All versions of FortiManager 6.4 should be migrated to a fixed release. Importantly, FortiManager Cloud does not have this vulnerability, restricting the issue to on-premises setups.

Fortinet advises upgrading to the patched versions as the primary solution. For those unable to update immediately, disabling the fgtupdates service can serve as a temporary workaround. This can be done by removing it from the service access list on relevant interfaces using the CLI configuration.

Security Recommendations

FortiManager is extensively used across enterprise and governmental sectors for centralized management of Fortinet security devices. Vulnerabilities that allow unauthorized remote code execution, even under specific conditions, significantly expand the attack surface for threat actors.

Security teams should conduct an immediate audit of active FortiManager services, apply necessary patches, and vigilantly monitor for unusual access to the fgtupdates service endpoint. The focus on network management platforms by cybercriminals is a growing concern as these systems are often used for lateral movement and establishing persistent access within managed infrastructures.

Stay informed with our regular cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:buffer overflow, CVE-2025-54820, Cybersecurity, Exploit, fgtupdates, FortiManager, Fortinet, Mitigation, network security, remote code execution, security patch, stack protection, unauthorized access, Vulnerability

Post navigation

Previous Post: Ericsson Data Breach Exposes Thousands’ Information
Next Post: Kevin Mandia’s Armadin Secures $190 Million for AI Cybersecurity

Related Posts

Cloudflare Unveils MCP Server Portals to Secure AI Revolution Cloudflare Unveils MCP Server Portals to Secure AI Revolution Cyber Security News
Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges Cyber Security News
CISA Releases New Indicators of Compromise Tied to BRICKSTORM Malware CISA Releases New Indicators of Compromise Tied to BRICKSTORM Malware Cyber Security News
VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands Cyber Security News
Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Europol‑Backed Operation Leads to 34 Arrests in Black Axe Crime Network Bust Cyber Security News
Russian Hackers Target Routers in Major DNS Hijacking Scheme Russian Hackers Target Routers in Major DNS Hijacking Scheme Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Alerts on Critical SimpleHelp Security Vulnerabilities
  • Windows RPC Flaw Risks System Access, Unpatched
  • AI Agents Excel in Marketplace, Reveal Key Challenges
  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Alerts on Critical SimpleHelp Security Vulnerabilities
  • Windows RPC Flaw Risks System Access, Unpatched
  • AI Agents Excel in Marketplace, Reveal Key Challenges
  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark