Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code

FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code

Posted on January 13, 2026January 13, 2026 By CWS

Fortinet has disclosed a essential heap-based buffer overflow vulnerability (CWE-122) within the cw_acd daemon of FortiOS and FortiSwitchManager.

This flaw allows a distant, unauthenticated attacker to execute arbitrary code or instructions by sending specifically crafted requests over the community.

Organizations counting on Fortinet’s firewalls, safe entry service edge (SASE) options, and change administration instruments face excessive threat, particularly in environments with uncovered material interfaces.

Found internally by Fortinet Product Safety Crew member Gwendal Guégniaud, the vulnerability was revealed on January 13, 2026. Whereas no CVE identifier has been assigned but, Fortinet urges quick patching as a result of threat of full-system compromise with out authentication.

A number of FortiOS branches, FortiSASE releases, and FortiSwitchManager variations are impacted. Directors ought to confirm their deployments and comply with the beneficial improve paths utilizing Fortinet’s improve device.

ProductAffected VersionsSolutionFortiOS 7.67.6.0 by way of 7.6.3Upgrade to 7.6.4 or aboveFortiOS 7.47.4.0 by way of 7.4.8Upgrade to 7.4.9 or aboveFortiOS 7.27.2.0 by way of 7.2.11Upgrade to 7.2.12 or aboveFortiOS 7.07.0.0 by way of 7.0.17Upgrade to 7.0.18 or aboveFortiOS 6.46.4.0 by way of 6.4.16Upgrade to six.4.17 or aboveFortiSASE 25.225.2.bAlready remediated in 25.2.cFortiSASE 25.1.a25.1.a.2Migrate to mounted releaseFortiSASE 24.4–22Not affectedN/AFortiSwitchManager 7.27.2.0 by way of 7.2.6Upgrade to 7.2.7 or aboveFortiSwitchManager 7.07.0.0 by way of 7.0.5Upgrade to 7.0.6 or above

Workarounds

Within the absence of patches, Fortinet recommends two mitigations. First, disable “material” entry on interfaces:

textconfig system interface
edit “port1”
set allowaccess ssh https # Take away ‘material’
subsequent
finish

Second, block CAPWAP-CONTROL visitors (UDP ports 5246-5249) by way of local-in insurance policies, permitting solely trusted sources. Outline customized providers, deal with teams, and insurance policies to allow from authorized IPs whereas denying others.

Fortinet advises prioritizing upgrades, monitoring logs for anomalous cw_acd exercise, and segmenting administration interfaces. This vulnerability underscores the continuing want for vigilant patch administration in enterprise networks.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Arbitrary, Attackers, Code, Execute, FortiOS, FortiSwitchManager, Remote, Vulnerability

Post navigation

Previous Post: 8000+ SmarterMail Hosts Vulnerable to RCE Attack
Next Post: Cyber Insights 2026: External Attack Surface Management

Related Posts

CISA Warns Of Oracle E-Business Suite SSRF Vulnerability Actively Exploited In Attacks CISA Warns Of Oracle E-Business Suite SSRF Vulnerability Actively Exploited In Attacks Cyber Security News
VoidLink Rootkit Exploits Linux with Advanced Techniques VoidLink Rootkit Exploits Linux with Advanced Techniques Cyber Security News
Hackers Exploiting Three-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls Hackers Exploiting Three-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls Cyber Security News
Rundll32 and WebDAV: New ClickFix Variant Evades Detection Rundll32 and WebDAV: New ClickFix Variant Evades Detection Cyber Security News
NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code NVIDIA VApp for Windows Vulnerability Let Attackers Execute Malicious Code Cyber Security News
ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark