Fortinet published security advisories this week to inform customers about vulnerabilities affecting several of the company’s products.
The cybersecurity firm’s latest batch of monthly advisories describe roughly a dozen vulnerabilities identified in FortiADC, FortiAnalyzer, FortiManager, FortiOS, FortiProxy, FortiClient, FortiDeceptor, FortiEDR, FortiNAC, FortiSwitch, FortiRecorder, and FortiVoiceEnterprise products.
Four CVEs have been assigned a “high” severity rating. This includes CVE-2022-26117, which affects FortiNAC and allows an attacker to access MySQL databases due to an unprotected root account.
Another high-severity flaw is a stack-based buffer overflow that allows arbitrary code or command execution. This issue, tracked as CVE-2021-43072, affects FortiAnalyzer, FortiManager, FortiOS and FortiProxy.
A “high severity” rating has also been assigned to CVE-2022-30302, a CVE assigned to multiple path traversal bugs in the FortiDeceptor admin interface that can be exploited by a remote attacker to retrieve and delete arbitrary files from the underlying file system.
A directory traversal issue affecting FortiClient for Windows, CVE-2021-41031, is also “high severity”. It allows a local attacker to escalate privileges.
Roughly half of the vulnerabilities were reported to Fortinet by external researchers — the rest were discovered internally. Only a couple of the flaws — rated “medium” and “low” — can be exploited without authentication.
Patches are available for all of these vulnerabilities. While none of the flaws sounds particularly dangerous, it’s not uncommon for threat actors to target Fortinet products in their attacks so users should update their systems as soon as possible.
Related: Tens of Thousands of Unpatched Fortinet VPNs Hacked via Old Security Flaw
Related: High-Severity Command Injection Vulnerability Found in Fortinet Firewall
Related: Vulnerabilities in Fortinet WAF Can Expose Corporate Networks to Attacks
Related: Vulnerabilities Expose Fortinet Firewalls to Remote Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
Latest News
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
