Fortinet and Ivanti patched 18 critical vulnerabilities on Tuesday including two critical-severity flaws that allow unauthenticated remote code execution. Both companies say they have no evidence of in-the-wild exploitation, though Ivanti warns that artificial intelligence models are accelerating vulnerability discovery to the point where traditional patch cycles may be too slow.
The timing matters because Ivanti disclosed a separate remote code execution flaw just last week that attackers were already exploiting in limited campaigns before the patch existed.
The Fortinet Fixes Target Authentication Bypasses
Fortinet’s two critical vulnerabilities both carry CVSS scores of 9.1 and allow unauthenticated attackers to execute code remotely. CVE-2026-44277 affects FortiAuthenticator’s access control mechanism according to SecurityWeek while CVE-2026-26083 hits FortiSandbox platforms through missing authorization checks. Both can be exploited by sending crafted HTTP requests to vulnerable appliances.
FortiAuthenticator serves as the central authentication hub for RADIUS, LDAP and SAML across enterprise networks, according to CSO Online. A successful attack on these systems could give attackers administrative access to the entire authentication infrastructure. FortiSandbox processes potentially malicious files for threat analysis making it another high-value target for attackers seeking to understand an organization’s security detection capabilities.
Fortinet also patched a high-severity out-of-bounds write vulnerability in FortiOS (CVE-2025-53844) that affects the CAPWAP daemon used to manage wireless access points. This flaw requires an attacker to control an access point endpoint but could lead to remote code execution on FortiGate devices.
The CVE numbers suggest Fortinet discovered these flaws months ago, CVE-2026 designations were assigned for 2026 vulnerabilities indicating internal discovery processes that can take substantial time to work through responsible disclosure.
AI Models Are Finding Flaws Traditional Scanners Miss
Ivanti’s May security update covers vulnerabilities in four products including Secure Access Client, Xtraction, Virtual Traffic Manager and Endpoint Manager. The most severe, CVE-2026-8043 in Xtraction allows authenticated attackers to read sensitive server files and write arbitrary HTML to web directories, a combination that enables stored cross-site scripting or web shell deployment.
But Ivanti’s disclosure includes a significant operational detail. The company has integrated multiple large language models into its product security workflow and is finding vulnerabilities that static and dynamic analysis tools routinely miss. “We have already successfully identified vulnerabilities which traditional tools missed, including some of those disclosed today,” Ivanti stated in its security blog.
The company expects ‘an increase in vulnerability disclosures’ as these AI tools mature and integrate further into development processes. That is both reassuring and concerning, it suggests more comprehensive security testing but also signals that current patch volumes may be artificially low because traditional tooling simply cannot find everything that exists.
The Exploitation Timeline Is Compressing
Ivanti’s warning about AI acceleration comes with recent evidence to back it up. Last week the company disclosed CVE-2026-6973, a remote code execution flaw in Endpoint Manager Mobile that was being exploited in ‘very limited’ attacks before any patch existed. CISA added that vulnerability to its Known Exploited Vulnerabilities catalogue within days, according to The Hacker News.
Cybersecurity News reported that SQL injection vulnerabilities in web consoles like Ivanti’s EPM are “well-documented, easy to weaponise and frequently targeted by ransomware operators and nation-state actors alike.” The publication noted that Fortinet infrastructure has been added to CISA’s KEV catalogue 24 times with 13 of those vulnerabilities actively used in ransomware attacks.
That track record suggests organizations should not wait for evidence of exploitation before patching. The window between disclosure and weaponization is narrowing particularly for products that sit at network perimeters or handle authentication functions.
What to Patch First
Priority one is Fortinet’s CVE-2026-44277 and CVE-2026-26083. Both are remotely exploitable without authentication and affect systems that typically have broad network access. FortiAuthenticator patches are available in versions 6.5.7, 6.6.9 and 8.0.3. FortiSandbox fixes vary by product version and deployment type.
Ivanti’s CVE-2026-8043 in Xtraction requires authentication but enables file read/write access that can be chained with other attacks. The fix is in Xtraction version 2026.2.
Both vendors have published detailed security advisories with version-specific patch guidance. Apply the updates during your next maintenance window if these systems are not internet-facing. If they are externally accessible, patch immediately.
References
- Fortinet, Ivanti Patch Critical Vulnerabilities
- Fortinet fixes two critical RCE flaws in FortiAuthenticator and FortiSandbox
- Ivanti Patches Multiple Vulnerabilities in Secure Access, Xtraction, vTM and Endpoint Manager
- Ivanti May 2026 Security Update
- Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation
This post is also available in:
Svenska