Home Fortinet CVE-2026-22627
Back to Fortinet

CVE-2026-22627

FortiSwitchAX - Firmware

Fortinet CVSS 8.8 Updated March 16, 2026

Executive Risk Summary

"A buffer copy without checking size of input vulnerability in Fortinet FortiSwitchAX may allow an unauthenticated attacker to execute unauthorized code or commands on the device. This vulnerability can be exploited by sending a crafted LLDP packet, potentially leading to code execution or command injection."

Operational Audit Arsenal

Target Type Firmware
Target Asset FortiSwitchAX
Standard Path Firmware Image

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Network disruption possible during firmware update

Internal Work Notes

Potential code execution vulnerability in FortiSwitchAX firmware, requiring immediate firmware update to prevent exploitation via crafted LLDP packets.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Original NVD Description

"A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.