Fortinet FortiManager fgtupdates Vulnerability Allows Attackers to Execute Malicious Commands


Fortinet has disclosed a high-severity stack-based buffer overflow vulnerability in its FortiManager platform that could allow remote unauthenticated attackers to execute unauthorized commands.

Tracked as CVE-2025-54820 and assigned a CVSSv3 score of 7.0, the flaw poses a significant risk to enterprise network management environments running affected versions of FortiManager.

The vulnerability resides in the fgtupdates service of FortiManager. A remote unauthenticated attacker can exploit this flaw by sending specially crafted requests to the service, potentially enabling unauthorized code execution on the targeted system.

The flaw is that conditional exploitation is only possible if the fgtupdates service is actively enabled on the device. Additionally, successful exploitation requires the attacker to bypass existing stack protection mechanisms, which increases attack complexity and contributes to a High rather than Critical CVSS rating.

Fortinet published the advisory on March 10, 2026, under internal reference FG-IR-26-098. The vulnerability was responsibly disclosed by researcher catalpa from Dbappsecurity Co., Ltd.

Affected Versions

The following FortiManager versions are confirmed affected:

google

VersionAffected BuildsRecommended Action
FortiManager 7.6Not affectedNot applicable
FortiManager 7.47.4.0 through 7.4.2Upgrade to 7.4.3 or above
FortiManager 7.27.2.0 through 7.2.10Upgrade to 7.2.11 or above
FortiManager 6.4All versionsMigrate to a fixed release

Notably, FortiManager Cloud is not affected by this vulnerability, limiting the scope to on-premises deployments.

Mitigation and Workaround

Fortinet strongly recommends upgrading to the respective patched releases as the primary remediation path. For organizations unable to apply patches immediately, Fortinet advises disabling the fgtupdates service as a temporary workaround.

Administrators can remove fgtupdates from the service access list on the relevant interface using the following CLI configuration:

textconfig system interface
edit 
set serviceaccess 
end

Ensure that fgtupdates is not listed among the enabled services on any exposed interface.

FortiManager is widely deployed across enterprise and government environments to centrally manage Fortinet security fabric devices. Any vulnerability enabling unauthenticated remote code execution, even under specific conditions, represents a serious attack surface.

Threat actors increasingly target network management platforms as pivot points for lateral movement and persistent access across managed infrastructure.

Security teams should audit active FortiManager services immediately, apply available patches, and monitor for anomalous access to the fgtupdates service endpoint.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link