<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>FortiOS (7.6.0 to 7.6.3) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/fortios-7.6.0-to-7.6.3/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 19:05:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/fortios-7.6.0-to-7.6.3/feed.xml" rel="self" type="application/rss+xml"/><item><title>Fortinet Patches Multiple Vulnerabilities in FortiAuthenticator, FortiOS, and FortiSandbox</title><link>https://feed.craftedsignal.io/briefs/2026-05-fortinet-multiple-vulnerabilities/</link><pubDate>Tue, 12 May 2026 19:05:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-fortinet-multiple-vulnerabilities/</guid><description>Fortinet released security advisories on May 12, 2026, addressing critical vulnerabilities including improper access control, incorrect global authorization, and out-of-bounds access across FortiAuthenticator, FortiOS, and FortiSandbox product lines, urging users to apply necessary updates.</description><content:encoded><![CDATA[<p>On May 12, 2026, Fortinet issued multiple security advisories addressing vulnerabilities found within its FortiAuthenticator, FortiOS, and FortiSandbox product lines. These advisories detail critical vulnerabilities such as improper access control on API endpoints, incorrect global authorization, and out-of-bounds memory access, potentially leading to unauthorized access or denial-of-service conditions. The affected products and versions include a range of releases, including FortiAuthenticator (versions 6.5.0 to 8.0.2), FortiOS (versions 7.2.0 to 7.6.3), and FortiSandbox (versions 4.4.0 to Cloud 24). Defenders should promptly review the advisories and apply the provided updates to mitigate potential risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the nature of the vulnerabilities (improper access control, incorrect authorization, and out-of-bounds access), the following represents a generalized attack chain:</p>
<ol>
<li><strong>Reconnaissance:</strong> Attacker identifies a vulnerable Fortinet appliance exposed to the network.</li>
<li><strong>Initial Access:</strong> Exploiting an improper access control vulnerability (FG-IR-26-128) to gain unauthorized access to API endpoints.</li>
<li><strong>Privilege Escalation:</strong> Leveraging an incorrect global authorization vulnerability (FG-IR-26-136) to escalate privileges within the system.</li>
<li><strong>Lateral Movement (Conditional):</strong> Depending on the configuration and network segmentation, the attacker may be able to use their elevated privileges to move laterally within the network.</li>
<li><strong>Out-of-bounds Access:</strong> Triggering an out-of-bounds memory access in the CAPWAP daemon (FG-IR-26-123), potentially leading to denial of service or information disclosure.</li>
<li><strong>Data Exfiltration or System Compromise:</strong> Using the compromised system to exfiltrate sensitive data or further compromise other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow attackers to gain unauthorized access to sensitive data, escalate privileges within the network, or cause denial-of-service conditions. The widespread use of Fortinet products across various sectors means a successful attack could impact numerous organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately apply the updates provided in the Fortinet security advisories (<a href="https://www.fortiguard.com/psirt?filter=1&amp;version=&amp;severity=5&amp;severity=4&amp;severity=3&amp;severity=2">https://www.fortiguard.com/psirt</a>) to address the vulnerabilities in FortiAuthenticator, FortiOS, and FortiSandbox.</li>
<li>Monitor network traffic for unusual activity related to Fortinet appliances, and deploy the Sigma rule below to detect unauthorized access attempts to API endpoints.</li>
<li>Review access control policies and authentication mechanisms on Fortinet appliances to ensure proper security configurations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fortinet</category><category>vulnerability</category><category>patch</category></item></channel></rss>