Changeflow GovPing Data Privacy & Cybersecurity Fortinet FortiSandbox Critical Vulnerabilities ...
Urgent Guidance Added Final

Fortinet FortiSandbox Critical Vulnerabilities CVSS 9.8 Remote Attack

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued security advisory WID-SEC-2026-1094 disclosing critical vulnerabilities in Fortinet FortiSandbox with CVSS Base Score 9.8. Multiple flaws allow remote attackers to conduct cross-site scripting attacks, disclose information, bypass security measures, and execute code. Affected versions include FortiSandbox below 5.0.5 and below 4.4.9.

What changed

CERT-Bund disclosed multiple critical vulnerabilities in Fortinet FortiSandbox appliances (CVSS Base Score 9.8). The flaws enable remote attackers to perform cross-site scripting, information disclosure, security bypass, and arbitrary code execution attacks. Organizations running affected FortiSandbox versions below 5.0.5 (v5.x) and below 4.4.9 (v4.x) must apply patches immediately to prevent exploitation. This is a high-priority security advisory requiring urgent attention from IT security teams responsible for network infrastructure.

Affected parties include organizations using Fortinet FortiSandbox for advanced threat detection. Immediate actions include updating to secure versions (5.0.5+ or 4.4.9+), reviewing CVE details, and implementing available mitigations. The temporal score of 8.5 indicates high exploitability likelihood, making this a priority remediation item for security operations teams.

What to do next

  1. Update FortiSandbox to patched versions immediately
  2. Review CVE references for affected products
  3. Apply vendor-supplied mitigations

Archived snapshot

Apr 16, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-1094] Fortinet FortiSandbox: Mehrere Schwachstellen CVSS Base Score 9.8 (kritisch) CVSS Temporal Score 8.5 (hoch) Remoteangriff ja Datum 14.04.2026 Stand 15.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges

Produktbeschreibung

FortiSandbox ist eine Advanced Threat Detection Appliance.

Produkte

14.04.2026
- Fortinet FortiSandbox <5.0.5

  • Fortinet FortiSandbox <4.4.9

  • Fortinet FortiSandbox <5.0.6

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Fortinet FortiSandbox ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen, Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Code zur Ausführung zu bringen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 14th, 2026
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-1094

Who this affects

Applies to
Technology companies
Industry sector
5112 Software & Technology
Activity scope
Vulnerability remediation Patch management Network security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Telecommunications

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!