EXECUTIVE SUMMARY:
A set of medium-severity vulnerabilities has been disclosed across multiple Fortinet products including FortiOS, FortiProxy, FortiWeb, and FortiSASE. These flaws affect SSL-VPN session handling, GUI WebSocket functionality, certificate validation, and Security Fabric authentication, potentially enabling unauthorized access, privilege escalation, or spoofed device identities. Although none are rated as critical, their exploitation could compromise administrative boundaries, authentication integrity, and secure communications across network segments. Fortinet has released patches addressing each issue, and users are strongly advised to update affected systems to minimize risk exposure.
These vulnerabilities affect critical security functions like session control and authentication across Fortinet products. Prompt patching is essential to prevent unauthorized access and privilege escalation.
RECOMMENDATION:
We strongly recommend you upgrade Fortinet products to below version links:
REFERENCES:
The following reports contain further technical details: