Fortiisolator Fortinet Fortiisolator

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Fortinet Fortiisolator.

By the Year

In 2026 there have been 0 vulnerabilities in Fortinet Fortiisolator. Last year, in 2025 Fortiisolator had 6 security vulnerabilities published. Right now, Fortiisolator is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 6 6.65
2024 0 0.00
2023 1 7.80
2022 1 8.80
2021 1 9.80
2020 1 5.40

It may take a day or so for new Fortiisolator vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Fortinet Fortiisolator Security Vulnerabilities

FortiIsolator <=2.4.4: Session Expiry & Auth Cookie Flaw (CWE-613/863)
CVE-2024-33507 7 - High - October 14, 2025

An insufficient session expiration vulnerability [CWE-613] and an incorrect authorization vulnerability [CWE-863] in FortiIsolator 2.4.0 through 2.4.4, 2.3 all versions, 2.2.0, 2.1 all versions, 2.0 all versions authentication mechanism may allow remote unauthenticated attacker to deauthenticate logged in admins via crafted cookie and remote authenticated read-only attacker to gain write privilege via crafted cookie.

Insufficient Session Expiration

FortiIsolator 2.4.x Improper Access Control in Logging HTTP Component Allows Log Alteration
CVE-2024-32124 - July 18, 2025

An improper access control vulnerability [CWE-284] in FortiIsolator version 2.4.4, version 2.4.3, 2.3 all versions logging component may allow a remote authenticated read-only attacker to alter logs via a crafted HTTP request.

Authorization

Insufficient Session Expiration in FortiSandbox/Isolator <4.5 Enables Admin Session Hijack
CVE-2024-27779 6.3 - Medium - July 18, 2025

An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted.

Insufficient Session Expiration

FortiIsolator CLI <2.4.6 OS Command Injection (CWE-78)
CVE-2024-54025 - April 08, 2025

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator CLI before version 2.4.6 allows a privileged attacker to execute unauthorized code or commands via crafted CLI requests.

Shell injection

FortiIsolator <2.4.6: OS Command Injection via crafted HTTP requests
CVE-2024-54024 - April 08, 2025

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator before version 2.4.6 allows a privileged attacker with super-admin profile and CLI access to execute unauthorized code via specifically crafted HTTP requests.

Shell injection

FortiIsolator OS Command Injection CVE-2024-55590 in 2.4.0-2.4.5
CVE-2024-55590 - March 11, 2025

Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiIsolator version 2.4.0 through 2.4.5 allows an authenticated attacker with at least read-only admin permission and CLI access to execute unauthorized code via specifically crafted CLI commands.

Shell injection

FortiIsolator OS Command Injection v1.0.02.3.4
CVE-2022-22298 7.8 - High - October 10, 2023

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiIsolator version 1.0.0, FortiIsolator version 1.1.0, FortiIsolator version 1.2.0 through 1.2.2, FortiIsolator version 2.0.0 through 2.0.1, FortiIsolator version 2.1.0 through 2.1.2, FortiIsolator version 2.2.0, FortiIsolator version 2.3.0 through 2.3.4 allows attacker to execute arbitrary OS commands in the underlying shell via specially crafted input parameters.

Shell injection

An improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may
CVE-2021-41020 8.8 - High - May 04, 2022

An improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may allow an authenticated, non privileged attacker to regenerate the CA certificate via the regeneration URL.

An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain
CVE-2020-6649 9.8 - Critical - February 08, 2021

An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)

Insufficient Session Expiration

An improper neutralization of input vulnerability in the URL Description in Fortinet FortiIsolator version 1.2.2
CVE-2020-6643 5.4 - Medium - March 12, 2020

An improper neutralization of input vulnerability in the URL Description in Fortinet FortiIsolator version 1.2.2 allows a remote authenticated attacker to perform a cross site scripting attack (XSS).

XSS

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Fortinet Fortiisolator or by Fortinet? Click the Watch button to subscribe.

Fortinet
Vendor

subscribe