Signal

Critical vulnerabilities patched in Fortinet products and Microsoft System Center

Evidence first: scan the strongest sources, then decide whether to go deeper.

Published 2026-04-14 19:18 UTCUpdated 2026-04-15 17:52 UTC
rss
cveexploitssecurity_toolingincident_response
Source links open
Source links and full evidence are open here. Archive history, compare-over-time, alerts, exports, API, integrations, and workflow are paid.
No card needed for the free brief.
Evidence trail (top sources)
top sources (3 domains)domains are deduped. counts indicate coverage, not truth.
3 top sources shown
Kwetsbaarheid in Microsoft System Center
NCSC NL (News) · News · ncsc.nl · 2026-04-15 14:25 UTC
Overview

Fortinet has addressed multiple vulnerabilities in FortiSandbox, FortiAnalyzer, and FortiManager products, including critical issues allowing unauthenticated attackers to execute code or bypass authentication.

Entities
FortinetMicrosoftFortiSandboxFortiAnalyzerFortiManagerMicrosoft System Center
Score total
1.33
Momentum 24h
6
Posts
6
Origins
4
Source types
1
Duplicate ratio
17%
Why now
  • Public proof-of-concept exploit code has appeared for Microsoft System Center vulnerability.
  • Multiple critical Fortinet vulnerabilities were disclosed and patched simultaneously.
  • Security agencies have issued urgent advisories recommending immediate updates.
Why it matters
  • These vulnerabilities allow remote code execution and privilege escalation, risking system compromise.
  • Public exploit code for Microsoft System Center flaw increases likelihood of active attacks.
  • Fortinet products are widely used in enterprise environments, so timely patching is critical.
LLM analysis
Topic mix: lowPromo risk: lowSource quality: high
Recurring claims
  • Fortinet FortiSandbox contains critical vulnerabilities allowing unauthenticated remote code execution and authentication bypass.
  • Microsoft System Center Defender has a high-risk privilege escalation vulnerability with public exploit code available.
How sources frame it
  • NCSC NL Security Advisories: neutral
  • CERT Belgium: neutral
All evidence
All evidence
Patch these critical Fortinet sandbox bugs that let attackers bypass login, run commands over HTTP
The Register Security · go.theregister.com · 2026-04-15 17:52 UTC
Warning: Remote Code Execution & Privilege Escalation in Fortinet FortiSandbox Patch Immediately!
CERT.BE (BE) - Advisories · ccb.belgium.be · 2026-04-15 14:51 UTC
Kwetsbaarheid in Microsoft System Center
NCSC NL (News) · ncsc.nl · 2026-04-15 14:25 UTC
NCSC-2026-0121 [1.00] [M/H] Kwetsbaarheden verholpen in Fortinet FortiSandbox
NCSC NL Security Advisories · advisories.ncsc.nl · 2026-04-15 12:23 UTC
Show filters & breakdown
Posts loaded: 0Publishers: 4Origin domains: 4Duplicates: -
Showing 4 / 0
Top publishers (this list)
  • The Register Security (1)
  • CERT.BE (BE) - Advisories (1)
  • NCSC NL (News) (1)
  • NCSC NL Security Advisories (1)
Top origin domains (this list)
  • go.theregister.com (1)
  • ccb.belgium.be (1)
  • ncsc.nl (1)
  • advisories.ncsc.nl (1)