Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
4026 articles · 143469 vulns · 36/41 feeds (7d)
← Back to list
9.1
CVE-2026-44277EXPLOITEDPATCHED
Fortinet · FortiAuthenticator

CVE-2026-44277: A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticat

Description

A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via <insert attack vector here>

Affected Products

VendorProductVersions
FortinetFortiAuthenticator8.0.2, 8.0.0, 6.6.0, 6.5.0, 6.4.0

References

  • https://fortiguard.fortinet.com/psirt/FG-IR-26-128

Related News (4 articles)

Tier B
CCCS Canada4h ago
Fortinet security advisory (AV26-454)
→ No new info (linked only)
Tier C
VulDB5h ago
CVE-2026-44277 | Fortinet FortiAuthenticator up to 8.0.2 access control (FG-IR-26-128)
→ No new info (linked only)
Tier D
BleepingComputer5h ago
Fortinet warns of critical RCE flaws in FortiSandbox and FortiAuthenticator
→ No new info (linked only)
Tier A
Fortinet PSIRT16h ago
Improper access control on API endpoints
→ No new info (linked only)
CVSS 3.19.1 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
8.0.3
CWECWE-284
PublishedMay 12, 2026
Last enriched4h agov5
Tags
IAMIDaaSFortiOSFortiSandbox
Trending Score82
Source articles4
Independent4
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-35616EXPKEV
CVE-2026-35616: A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated atta
Trending: 167
HIGHCVE-2025-53844EXP
CVE-2025-53844: A out-of-bounds write vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0
Trending: 62
MEDIUMCVE-2025-53680EXP
CVE-2025-53680: An improper neutralization of special elements used in an OS command ("OS Command Injection") vulnerability [CWE-78] vul
Trending: 58
MEDIUMCVE-2025-53870EXP
CVE-2025-53870: An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet
Trending: 58
CRITICALCVE-2026-26083
CVE-2026-26083: A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.8, Fo
Trending: 55

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 12, 2026
Discovered by ZDM
May 12, 2026
Updated: affectedVersions, patchAvailable, exploitAvailable, activelyExploited
May 12, 2026
Updated: affectedVersions, tags
May 12, 2026
Updated: affectedVersions, severity
May 12, 2026
Updated: affectedVersions, description, tags
May 12, 2026
Actively Exploited
May 12, 2026
Exploit Available
May 12, 2026
Patch Available
May 12, 2026

Version History

v5
Last enriched 4h ago
v5Tier B4h ago

Updated affected versions with new FortiOS and FortiSandbox versions and added detailed description of the vulnerability.

affectedVersionsdescriptiontags
via CCCS Canada
v4Tier C4h ago

Added affected version 6.4.10, updated severity from CRITICAL to HIGH, and noted that no exploit is available.

affectedVersionsseverity
via VulDB
v3Tier D4h ago

Updated affected versions to include 6.5.7 and 6.6.9, added new description details, and included new tags related to IAM and IDaaS.

affectedVersionstags
via BleepingComputer
v2Tier A6h ago

Updated affected versions to include 8.0.3, 6.6.9, and 6.5.7, and marked exploit availability and active exploitation as true.

affectedVersionspatchAvailableexploitAvailableactivelyExploited
via Fortinet PSIRT
v16h ago

Initial creation