Fortinet's other products take their turn: FortiWeb, FortiManager, FortiClient EMS
Beyond the long-running FortiOS auth-bypass cycle, 2025-2026 brought a wave of exploited bugs in FortiWeb, FortiManager, and FortiClient EMS, SQL injection, path traversal, auth bypass, and a format-string RCE. Same vendor, same perimeter-and-management target profile.
Fortinet’s FortiOS SSL-VPN has its own long-running auth-bypass cycle, but in 2025 and 2026 the rest of the Fortinet lineup took its turn in the catalog: FortiWeb, FortiManager, and FortiClient EMS, with SQL injection, path traversal, authentication bypass, and a format-string RCE among them. Same vendor, same profile, internet-facing perimeter and management products that attackers hit fast.
FortiWeb
FortiWeb, Fortinet’s web application firewall, accumulated several exploited bugs: CVE-2025-25257 (a SQL injection enabling code execution), CVE-2025-64446 (a path traversal abused to create administrative accounts and take over the device), and CVE-2025-58034 (an OS command injection). A WAF is supposed to protect web apps; bugs that let attackers take over the WAF itself invert that, and these saw active exploitation.
FortiManager and multi-product
CVE-2025-32756 is a format-string remote code execution affecting multiple Fortinet products (FortiManager among them), the kind of bug that gives code execution on the appliance that centrally manages your Fortinet fleet, a high-leverage target. CVE-2025-59718 and CVE-2026-24858 likewise span multiple products. FortiManager controls policy across many firewalls, so RCE there is a path to the whole managed estate, the same management-plane concern as Cisco’s controllers.
FortiClient EMS
CVE-2026-21643 and CVE-2026-35616 are recent flaws in FortiClient EMS, the Enterprise Management Server for FortiClient endpoints, the same product as the SQL-injection-to-SYSTEM CVE-2023-48788. EMS manages security agents across the fleet, so it’s another privileged management server worth defending as tier-zero.
What to do
- Patch all Fortinet products, not just FortiOS. FortiWeb, FortiManager, FortiClient EMS, and the rest need the same emergency-patch discipline as the firewalls. Track Fortinet PSIRT advisories across the whole product set.
- Get management and admin interfaces off the internet. FortiWeb’s management, FortiManager, and FortiClient EMS should sit on a management network, not face the world.
- Treat the management products (FortiManager, FortiClient EMS) as tier-zero. RCE on the box that manages your firewalls or endpoint agents is a path to the whole fleet.
- After auth-bypass/path-traversal bugs, audit for attacker persistence. CVE-2025-64446 was used to create admin accounts; as with the FortiOS 40684 lesson, patch and then hunt for rogue accounts and config changes the patch doesn’t remove.
- Assume compromise on exposed, unpatched instances and rotate credentials the devices held.
The reframe is to widen your Fortinet patching beyond the headline FortiOS bugs to the whole product line, because the WAF, the central manager, and the endpoint-management server are all internet-adjacent, privileged, and actively targeted. Patch them all on the vendor’s clock, keep their management planes off the open network, and audit for the persistence these auth-bypass and path-traversal bugs enable. We track the Fortinet entries across products, because the attackers don’t limit themselves to FortiOS.
Sources
Share
Related field notes
-
Shitrix: the Citrix bug that taught everyone how fast a perimeter RCE goes from PoC to pandemic
CVE-2019-19781, 'Shitrix,' was a path-traversal RCE in Citrix NetScaler. After disclosure with no patch, a public exploit dropped and mass exploitation followed within days. It set the template for the NetScaler-as-target story that CitrixBleed later continued.
-
Palo Alto GlobalProtect CVE-2019-1579: another VPN gateway, another pre-auth RCE
CVE-2019-1579 was a pre-authentication remote code execution in Palo Alto's GlobalProtect SSL-VPN. It's one more entry in the longest-running story in this catalog: the SSL-VPN gateway as a perennial, pre-auth-RCE-prone perimeter target.
-
Cisco's management and identity products keep showing up in the catalog
Smart Licensing Utility, Identity Services Engine, IOS XE, Catalyst SD-WAN Manager, Unified Communications Manager, a run of exploited Cisco bugs in 2024-2026, including a hardcoded credential and several unauthenticated RCEs. The management plane is the target.
One email, every weekday morning.
You're in. Check your inbox.