Description
An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4 all versions, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all versions, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4 all versions, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions, FortiManager Cloud 6.4 all versions may allow an attacker to bypass bruteforce protections via exploitation of race conditions. The latter raises the complexity of practical exploitation.
Published: 2026-03-10
Score: 3.4 Low
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass allowing account takeover
Action: Patch now
AI Analysis

Impact

Fortinet FortiAnalyzer and FortiManager products contain an improper restriction of excessive authentication attempts that can be exploited through race conditions. The flaw allows attackers to bypass built‑in brute‑force protections, enabling them to gain unauthorized access to administrative or user accounts. While exploitation is complex, an attacker who succeeds could compromise the system, potentially leading to full administrative control and lateral movement across the network.

Affected Systems

The vulnerability affects Fortinet FortiAnalyzer and FortiAnalyzer Cloud versions from 6.4 through 7.6.4, FortiAnalyzer Cloud 7.4, 7.2, 7.0, and 6.4, as well as FortiManager and FortiManager Cloud from 6.4 through 7.6.4. Upgrading to version 7.6.5 or later, or any 8.0.0 release, eliminates the issue in all affected firmware lines.

Risk and Exploitability

The CVSS score of 3.4 indicates a low severity, and the EPSS score of less than 1% suggests a very low probability of exploitation. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog, indicating no known active exploitation. However, the attack requires local or remote access to an authentication service and benefits from a race condition, making practical exploitation difficult but not impossible. Due to the potential for account takeover, administrators should treat the impact as significant and prioritize remediation.

Generated by OpenCVE AI on April 16, 2026 at 03:50 UTC.

Remediation

Vendor Solution

Upgrade to upcoming FortiAnalyzer version 8.0.0 or above Upgrade to FortiAnalyzer version 7.6.5 or above Upgrade to upcoming FortiAnalyzer Cloud version 8.0.0 or above Upgrade to FortiAnalyzer Cloud version 7.6.5 or above Upgrade to upcoming FortiManager version 8.0.0 or above Upgrade to FortiManager version 7.6.5 or above Upgrade to upcoming FortiManager Cloud version 8.0.0 or above Upgrade to FortiManager Cloud version 7.6.5 or above


OpenCVE Recommended Actions

  • Apply FortiAnalyzer firmware version 7.6.5 or later (or 8.0.0+)
  • Apply FortiAnalyzer Cloud firmware version 7.6.5 or later (or 8.0.0+)
  • Apply FortiManager firmware version 7.6.5 or later (or 8.0.0+)
  • Apply FortiManager Cloud firmware version 7.6.5 or later (or 8.0.0+)

Generated by OpenCVE AI on April 16, 2026 at 03:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Title Fortinet FortiAnalyzer/Manager Brute‑Force Authentication Bypass via Race Condition

Fri, 13 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*

Thu, 12 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.2, FortiAnalyzer Cloud 7.4.1 through 7.4.7, FortiAnalyzer Cloud 7.2.1 through 7.2.10, FortiAnalyzer Cloud 7.0.1 through 7.0.14, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all versions, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions, FortiManager Cloud 7.6.2 through 7.6.3, FortiManager Cloud 7.4.1 through 7.4.7, FortiManager Cloud 7.2.1 through 7.2.10, FortiManager Cloud 7.0.1 through 7.0.14, FortiManager Cloud 6.4 all versions may allow an attacker to bypass bruteforce protections via exploitation of race conditions. The latter raises the complexity of practical exploitation. An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4 all versions, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all versions, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4 all versions, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions, FortiManager Cloud 6.4 all versions may allow an attacker to bypass bruteforce protections via exploitation of race conditions. The latter raises the complexity of practical exploitation.

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet fortianalyzer Cloud
Fortinet fortimanager Cloud
Vendors & Products Fortinet fortianalyzer Cloud
Fortinet fortimanager Cloud

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.2, FortiAnalyzer Cloud 7.4.1 through 7.4.7, FortiAnalyzer Cloud 7.2.1 through 7.2.10, FortiAnalyzer Cloud 7.0.1 through 7.0.14, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all versions, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions, FortiManager Cloud 7.6.2 through 7.6.3, FortiManager Cloud 7.4.1 through 7.4.7, FortiManager Cloud 7.2.1 through 7.2.10, FortiManager Cloud 7.0.1 through 7.0.14, FortiManager Cloud 6.4 all versions may allow an attacker to bypass bruteforce protections via exploitation of race conditions. The latter raises the complexity of practical exploitation.
First Time appeared Fortinet
Fortinet fortianalyzer
Fortinet fortianalyzercloud
Fortinet fortimanager
Fortinet fortimanagercloud
Weaknesses CWE-307
CPEs cpe:2.3:a:fortinet:fortianalyzercloud:6.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:6.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:6.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:6.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:6.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:6.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:6.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.11:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.12:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.13:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.14:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.10:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.2.9:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzercloud:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:6.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:6.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:6.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:6.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:6.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:6.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:6.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.11:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.12:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.13:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.14:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.10:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.2.9:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanagercloud:7.6.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.16:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.6.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.6.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.6.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.6.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.16:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.6.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.6.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.6.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.6.4:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortianalyzer
Fortinet fortianalyzercloud
Fortinet fortimanager
Fortinet fortimanagercloud
References
Metrics cvssV3_1

{'score': 3.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:C'}


Subscriptions

Fortinet Fortianalyzer Fortianalyzer Cloud Fortianalyzercloud Fortimanager Fortimanager Cloud Fortimanagercloud
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-03-12T17:13:56.855Z

Reserved: 2026-01-08T06:49:28.869Z

Link: CVE-2026-22629

cve-icon Vulnrichment

Updated: 2026-03-10T17:34:27.461Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:12.880

Modified: 2026-03-13T16:04:03.660

Link: CVE-2026-22629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:00:09Z

Weaknesses