Known vulnerabilities in Fortinet, Inc FortiOS 7.2.2 - page 6

Vendor: Fortinet, Inc
Website: https://www.fortinet.com/
Total Security Bulletins: 116

Security bulletins (116)

Secuity bulletin Severity Status Published
SB2026021047: SSL-VPN symlink persistence patch bypass in FortiOS High
Patched Exploited
10.02.2026
SB2026021046: Format String error in FortiOS CAPWAP fast-failover mode Low
Patched
10.02.2026
SB2026021045: HTTP request smuggling in FortiOS GUI Medium
Patched
10.02.2026
SB2026021044: Firewall policy bypass in FortiOS FSSO Terminal Services Agent Low
Patched
10.02.2026
SB2026012392: FortiCloud SSO login authentication bypass in Fortinet products Critical
Patched Exploited
23.01.2026
SB2026011365: Remote code execution in FortiOS and FortiSwitchManager cw_acd daemo Critical
Patched
13.01.2026
SB2025121064: FortiCloud SSO login authentication bypass in Fortinet products Critical
Patched Exploited
10.12.2025
SB2025120983: REST API key disclosure in Fortinet products Low
Patched
09.12.2025
SB2025120945: Insufficient Session Expiration in FortiOS Medium
Patched
09.12.2025
SB2025111874: Stack buffer overflow in FortiOS CAPWAP daemon Medium
Patched
18.11.2025
SB2025111873: Improper privilege management in Fortinet products Low
Patched
18.11.2025
SB2025111871: Buffer underflow in FortiOS Low
Patched
18.11.2025
SB2025102464: Use of uninitialized resource in FortiOS and FortiProxy SSL-VPN Medium
Patched
24.10.2025
SB2025102162: Multiple vulnerabilities in Fortinet FortiOS, FortiProxy and FortiSASE Low
Patched
21.10.2025
SB2025101576: Stack-based buffer overflow in FortiOS and FortiProxy Low
Patched
15.10.2025
SB2025101575: Improper validation of certificate with host mismatch in FortiOS and FortiProxy Medium
Patched
15.10.2025


Showing elements 101 - 120 out of 116