ctipilot.ch

Fortinet FortiAuthenticator unauthenticated RCE (CWE-284, CVSS 9.8) — pre-auth, fixed in 6.5.7 / 6.6.9 / 8.0.3

cve · CVE-2026-44277

Coverage timeline
2
first 2026-05-13 → last 2026-05-13
Briefs
1
1 distinct
Sources cited
15
9 hosts
Sections touched
2
action_items, trending_vulns
Co-occurring entities
1
see Related entities below

Story timeline

  1. 2026-05-13CTI Daily Brief — 2026-05-13
    trending_vulnsNew 2026-05-12 Fortinet PSIRT; pre-auth RCE; NCSC-CH corroborating.
  2. 2026-05-13CTI Daily Brief — 2026-05-13
    action_itemsAction item referencing in-brief detail.

Where this entity is cited

  • trending_vulns1
  • action_items1

Source distribution

  • attack.mitre.org6 (40%)
  • fortiguard.fortinet.com2 (13%)
  • bleepingcomputer.com1 (7%)
  • security-hub.ncsc.admin.ch1 (7%)
  • blick.ch1 (7%)
  • comparitech.com1 (7%)
  • cybermaxx.com1 (7%)
  • groupe3r.ch1 (7%)
  • other1 (7%)

Related entities

External references

NVD · cve.org · CISA KEV

All cited sources (15)

Items in briefs about Fortinet FortiAuthenticator unauthenticated RCE (CWE-284, CVSS 9.8) — pre-auth, fixed in 6.5.7 / 6.6.9 / 8.0.3 (1)

CVE-2026-44277 / CVE-2026-26083 — Fortinet FortiAuthenticator and FortiSandbox unauthenticated RCE

From CTI Daily Brief — 2026-05-13 · published 2026-05-13 · view item permalink →

Fortinet published two PSIRT advisories on 2026-05-12, picked up by NCSC-CH within hours. CVE-2026-44277 (CWE-284 Improper Access Control) is an unauthenticated network attacker reaching the FortiAuthenticator management-interface API and executing arbitrary commands via crafted requests; vendor PSIRT lists CVSS 9.1 (NCSC-CH and some early reports surfaced 9.8 — § 7 documents the convergence). Affected: 6.5.0–6.5.6, 6.6.0–6.6.8 and 8.0.0–8.0.2. Fixed in 6.5.7 / 6.6.9 / 8.0.3. FortiAuthenticator Cloud (IDaaS) is not affected (Fortinet PSIRT FG-IR-26-128, 2026-05-12; NCSC-CH Security Hub #12569, 2026-05-13). CVE-2026-26083 (CWE-862 Missing Authorization) is an unauthenticated attacker reaching the FortiSandbox Web UI and executing code at CVSS 9.1 per the Fortinet PSIRT advisory (Fortinet PSIRT FG-IR-26-136, 2026-05-12; BleepingComputer, 2026-05-13). Affected FortiSandbox: 4.4.0–4.4.8 (fixed 4.4.9), 5.0.0–5.0.1 (fixed 5.0.2), plus multiple PaaS / Cloud variants; on-prem Cloud 23 and 24 require migration rather than an in-place patch. Both discoveries are attributed to internal Fortinet audit; exploitation status is unknown at disclosure. The defender-relevant attack surface is the network-reachable management plane on each appliance class. Detection concepts mapped to T1190 Exploit Public-Facing Application: alert on FortiAuthenticator / FortiSandbox management-port reach from outside the SOC management VLAN; treat any anomalous outbound HTTP from these appliances (Sysmon-equivalent on FortiOS via diagnose debug application httpsd for FortiAuthenticator) as potential post-exploit egress. Hardening: enforce the perimeter / internal firewall rule that FortiAuthenticator GUI / API and FortiSandbox Web UI are reachable only from named admin / SOC source IPs — Fortinet's PSIRT pages explicitly call this out as the residual hardening even after patching.