Fortinet FortiSandbox Critical Vulnerabilities CVSS 9.8 Remote Attack
Summary
CERT-Bund issued security advisory WID-SEC-2026-1094 disclosing critical vulnerabilities in Fortinet FortiSandbox with CVSS Base Score 9.8. Multiple flaws allow remote attackers to conduct cross-site scripting attacks, disclose information, bypass security measures, and execute code. Affected versions include FortiSandbox below 5.0.5 and below 4.4.9.
What changed
CERT-Bund disclosed multiple critical vulnerabilities in Fortinet FortiSandbox appliances (CVSS Base Score 9.8). The flaws enable remote attackers to perform cross-site scripting, information disclosure, security bypass, and arbitrary code execution attacks. Organizations running affected FortiSandbox versions below 5.0.5 (v5.x) and below 4.4.9 (v4.x) must apply patches immediately to prevent exploitation. This is a high-priority security advisory requiring urgent attention from IT security teams responsible for network infrastructure.
Affected parties include organizations using Fortinet FortiSandbox for advanced threat detection. Immediate actions include updating to secure versions (5.0.5+ or 4.4.9+), reviewing CVE details, and implementing available mitigations. The temporal score of 8.5 indicates high exploitability likelihood, making this a priority remediation item for security operations teams.
What to do next
- Update FortiSandbox to patched versions immediately
- Review CVE references for affected products
- Apply vendor-supplied mitigations
Archived snapshot
Apr 16, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-1094] Fortinet FortiSandbox: Mehrere Schwachstellen CVSS Base Score 9.8 (kritisch) CVSS Temporal Score 8.5 (hoch) Remoteangriff ja Datum 14.04.2026 Stand 15.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
Produktbeschreibung
FortiSandbox ist eine Advanced Threat Detection Appliance.
Produkte
14.04.2026
- Fortinet FortiSandbox <5.0.5
Fortinet FortiSandbox <4.4.9
Fortinet FortiSandbox <5.0.6
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Fortinet FortiSandbox ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen, Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Code zur Ausführung zu bringen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.