Home Fortinet CVE-2026-39813
Back to Fortinet

CVE-2026-39813

FortiSandbox - File Directory Service

Fortinet CVSS 9.8 Updated April 16, 2026

Executive Risk Summary

"A path traversal vulnerability in FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8 may allow an attacker to escalate privileges via the '../filedir' attack vector. This vulnerability could potentially lead to unauthorized access and control of the affected system."

Anticipated Attack Path

  1. 1. Initial Exploitation: Attacker sends a crafted request to the FortiSandbox appliance
  2. 2. Privilege Escalation: Attacker exploits the path traversal vulnerability to gain elevated privileges
  3. 3. Post-Exploitation: Attacker executes system commands on the compromised appliance

Am I Vulnerable?

  • Verify FortiSandbox version and update to a patched version
  • Monitor system logs for suspicious activity
  • Restrict access to the FortiSandbox appliance

Operational Audit Arsenal

Target Type Service
Target Asset fsys
Standard Path /etc/init.d/

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to sandboxing services

Internal Work Notes

Urgent: FortiSandbox path traversal vulnerability - update to patched version and monitor system logs

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.