Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Critical Fortinet Sandbox Bugs Exposed: A Wake-Up Call for Cybersecurity



Two critical bugs have been discovered in Fortinet's sandbox, highlighting the importance of keeping software up to date and the need for vigilance in cybersecurity. The bugs, identified as CVE-2026-39808 and CVE-2026-39813, were rated at 9.1 CVSS and could potentially allow attackers to bypass authentication or execute unauthorized code on vulnerable systems. Organizations are advised to patch their systems as soon as possible and prioritize software updates, monitoring, and vigilance in addressing these vulnerabilities.

  • Fortinet has disclosed two critical bugs in its sandbox, CVE-2026-39808 and CVE-2026-39813.
  • The bugs are an OS command injection flaw and a path traversal bug in the FortiSandbox JRPC API.
  • The vulnerabilities have been rated at 9.1 CVSS, indicating their high severity and potential impact on systems running affected versions of FortiSandbox.
  • Fortinet has released fixes for both bugs, and users are advised to patch their systems as soon as possible.
  • Security researchers have developed scanners to help identify vulnerable instances of FortiSandbox.
  • The discovery highlights the importance of cybersecurity, software updates, and vigilance in protecting against emerging threats.



  • Fortinet has recently disclosed two critical bugs in its sandbox, highlighting the importance of keeping software up to date and the need for vigilance in cybersecurity. The bugs, identified as CVE-2026-39808 and CVE-2026-39813, were discovered by a security researcher named Loic Pantano, who is known for his expertise in identifying vulnerabilities in Fortinet's products.

    The first bug, CVE-2026-39808, is an OS command injection flaw that allows unauthenticated attackers to execute unauthorized code or commands via HTTP requests. This vulnerability has been rated at 9.1 CVSS, indicating its high severity and potential impact on systems running FortiSandbox versions 4.4.0 through 4.4.8.

    The second bug, CVE-2026-39813, is a path traversal bug in the FortiSandbox JRPC API that allows authentication bypass using specially crafted HTTP requests. This vulnerability has also been rated at 9.1 CVSS and affects FortiSandbox versions 4.4.0 through 4.4.8 and 5.0.0 through 5.0.5.

    The discovery of these bugs is significant, as they could potentially allow attackers to bypass authentication or execute unauthorized code on vulnerable systems. However, it's worth noting that Fortinet has already released fixes for both vulnerabilities, and users are advised to patch their systems as soon as possible.

    In addition to the patches from Fortinet, security researchers have also developed scanners to help identify whether vulnerable instances of FortiSandbox exist on affected systems. This is a valuable resource for organizations that rely heavily on Fortinet's products for cybersecurity.

    The timing of these discoveries comes at a time when cybersecurity concerns are at an all-time high. With the increasing number of cyberattacks and data breaches, it's essential to prioritize software updates, patching, and monitoring to prevent potential vulnerabilities from being exploited.

    Furthermore, the exposure of critical security bugs in Fortinet's sandbox serves as a reminder that no system is completely secure, and vigilance is crucial for protecting against emerging threats. As such, organizations must remain vigilant and proactive in addressing these vulnerabilities to minimize their impact.

    In conclusion, the discovery of critical bugs in Fortinet's sandbox highlights the importance of cybersecurity and software updates. Organizations must prioritize patching and monitoring to prevent potential vulnerabilities from being exploited. With the increasing number of cyberattacks and data breaches, it's essential to stay ahead of emerging threats and remain vigilant in protecting against them.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Critical-Fortinet-Sandbox-Bugs-Exposed-A-Wake-Up-Call-for-Cybersecurity-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2026/04/15/critical_fortinet_sandbox_bugs/

  • https://www.theregister.com/2026/04/15/critical_fortinet_sandbox_bugs/

  • https://netcrook.com/fortinet-fortisandbox-critical-vulnerabilities-patch/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-39808

  • https://www.cvedetails.com/cve/CVE-2026-39808/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-39813

  • https://www.cvedetails.com/cve/CVE-2026-39813/


  • Published: Wed Apr 15 13:58:06 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us