PSIRT Advisories
The following is a list of advisories for issues resolved in Fortinet products. The resolution of such issues is coordinated by the Fortinet Product Security Incident Response Team (PSIRT), a dedicated, global team that manages the receipt, investigation, and public reporting of information about security vulnerabilities and issues related to Fortinet products and services.
For details of how to raise a PSIRT Issue with Fortinet, please see our PSIRT Policy here.
An insufficient session expiration vulnerability in FortiDeceptor may allow an attacker to reuse the unexpired admin user session...
An expression language injection vulnerability in FortiSIEM JBoss RichFaces library may allow a remote attacker to inject expression...
An improper neutralization of input vulnerability in FortiWLC may allow a remote authenticated attacker to perform a stored cross...
An improper neutralization of input vulnerability in the Admin Profile of FortiAnalyzer may allow a remote authenticated attacker...
An unquoted service path vulnerability in the FortiSIEM Windows Agent component may allow an attacker to gain elevated privileges...
Use of a hard-coded cryptographic key to encrypt security sensitive data in configuration in FortiClient for Windows may allow...
An information exposure vulnerability in FortiOS WEB UI may allow an unauthenticated attacker to gain platform information such...
An improper neutralization of input vulnerability in the FortiGateCloud login page may allow a remote unauthenticated attacker...
An Insecure Temporary File (CWE-377) vulnerability in FortiClient for Windows may allow a local user to gain elevated privileges...
An improper input validation (CWE-20) vulnerability in FortiAP CLI admin console may allow unauthorized administrators to overwrite...
TCP stacks that lack RFC 5961 3.2 & 4.2 support (or have it disabled at application level) may allow remote attackers to guess...
An improper authentication vulnerability in FortiMail and FortiVoiceEnterprise may allow a remote unauthenticated attacker to...
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not...
An improper neutralization of input vulnerability in the dashboard of FortiADC may allow an authenticated attacker to perform...
An improper authorization vulnerability in FortiADC may allow a remote authenticated user with low privileges to perform certain...