May 15, 2026
By esentry Team

Vulnerabilities in FortiSandbox and FortiAuthenticator

Fortinet has released security updates addressing two critical vulnerabilities affecting Fortinet products FortiSandbox and FortiAuthenticator. Both vulnerabilities carry a CVSS score of 9.1 and may allow unauthenticated remote code execution (RCE) through specially crafted HTTP requests. Successful exploitation could result in full system compromise, unauthorized command execution, and potential takeover of enterprise identity and security infrastructure.

Affected Vulnerabilities

Technical Overview

CVE-2026-26083 – FortiSandbox

The vulnerability affects the FortiSandbox Web UI, including:

  • FortiSandbox (on-premises)
  • FortiSandbox Cloud
  • FortiSandbox PaaS

The flaw stems from missing authorization checks that could permit attackers to execute arbitrary commands remotely. Since FortiSandbox is commonly deployed as a malware analysis and threat inspection platform, compromise of this appliance could undermine an organization’s security monitoring and malware detection capabilities.  

CVE-2026-44277 – FortiAuthenticator

This vulnerability affects on-premises FortiAuthenticator deployments and allows unauthenticated attackers to execute unauthorized code through crafted requests. Because FortiAuthenticator manages:

  • Multi-factor authentication (MFA)
  • Identity management
  • Authentication trust chains
  • RADIUS and certificate services

successful exploitation may allow attackers to bypass authentication controls and pivot deeper into enterprise environments.  

Affected Versions

Risk Assessment : Risk Level:  CRITICAL

Potential Vulnerability  impacts include:

  • Remote system takeover
  • Authentication bypass
  • Unauthorized command execution
  • Disruption of malware analysis workflows
  • Lateral movement within enterprise networks
  • Compromise of IAM infrastructure

Recommended Actions

  1. Apply security patches immediately
    • Upgrade FortiAuthenticator to:
      • 6.5.7+
      • 6.6.9+
      • 8.0.3+
    • Upgrade FortiSandbox to:
      • 5.0.2+
      • 4.4.9+
      • 5.0.6+ (Cloud)
  2. Disable public internet access to admin portals and Limit access using VPNs or trusted IP ranges
  3. Implement network segmentation
  4. Monitor for suspicious activities
    • Unexpected HTTP requests
    • Unauthorized account creation
    • Abnormal outbound connections
    • Privilege escalation attempts
  5. Inspect authentication log and Monitor FortiSandbox and FortiAuthenticator events
  6. Enable MFA and hardened access policies

Indicators of Concern

  • Unusual HTTP requests targeting Fortinet Web UI endpoints
  • Suspicious outbound communications from FortiSandbox systems
  • Unauthorized configuration changes
  • Authentication anomalies within IAM systems
  • Unexpected service account activity