Fortinet Fortiisolator
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Fortinet Fortiisolator.
By the Year
In 2026 there have been 0 vulnerabilities in Fortinet Fortiisolator. Last year, in 2025 Fortiisolator had 6 security vulnerabilities published. Right now, Fortiisolator is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 6 | 6.65 |
| 2024 | 0 | 0.00 |
| 2023 | 1 | 7.80 |
| 2022 | 1 | 8.80 |
| 2021 | 1 | 9.80 |
| 2020 | 1 | 5.40 |
It may take a day or so for new Fortiisolator vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Fortinet Fortiisolator Security Vulnerabilities
FortiIsolator <=2.4.4: Session Expiry & Auth Cookie Flaw (CWE-613/863)
CVE-2024-33507
7 - High
- October 14, 2025
An insufficient session expiration vulnerability [CWE-613] and an incorrect authorization vulnerability [CWE-863] in FortiIsolator 2.4.0 through 2.4.4, 2.3 all versions, 2.2.0, 2.1 all versions, 2.0 all versions authentication mechanism may allow remote unauthenticated attacker to deauthenticate logged in admins via crafted cookie and remote authenticated read-only attacker to gain write privilege via crafted cookie.
Insufficient Session Expiration
FortiIsolator 2.4.x Improper Access Control in Logging HTTP Component Allows Log Alteration
CVE-2024-32124
- July 18, 2025
An improper access control vulnerability [CWE-284] in FortiIsolator version 2.4.4, version 2.4.3, 2.3 all versions logging component may allow a remote authenticated read-only attacker to alter logs via a crafted HTTP request.
Authorization
Insufficient Session Expiration in FortiSandbox/Isolator <4.5 Enables Admin Session Hijack
CVE-2024-27779
6.3 - Medium
- July 18, 2025
An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted.
Insufficient Session Expiration
FortiIsolator CLI <2.4.6 OS Command Injection (CWE-78)
CVE-2024-54025
- April 08, 2025
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator CLI before version 2.4.6 allows a privileged attacker to execute unauthorized code or commands via crafted CLI requests.
Shell injection
FortiIsolator <2.4.6: OS Command Injection via crafted HTTP requests
CVE-2024-54024
- April 08, 2025
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiIsolator before version 2.4.6 allows a privileged attacker with super-admin profile and CLI access to execute unauthorized code via specifically crafted HTTP requests.
Shell injection
FortiIsolator OS Command Injection CVE-2024-55590 in 2.4.0-2.4.5
CVE-2024-55590
- March 11, 2025
Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiIsolator version 2.4.0 through 2.4.5 allows an authenticated attacker with at least read-only admin permission and CLI access to execute unauthorized code via specifically crafted CLI commands.
Shell injection
FortiIsolator OS Command Injection v1.0.02.3.4
CVE-2022-22298
7.8 - High
- October 10, 2023
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiIsolator version 1.0.0, FortiIsolator version 1.1.0, FortiIsolator version 1.2.0 through 1.2.2, FortiIsolator version 2.0.0 through 2.0.1, FortiIsolator version 2.1.0 through 2.1.2, FortiIsolator version 2.2.0, FortiIsolator version 2.3.0 through 2.3.4 allows attacker to execute arbitrary OS commands in the underlying shell via specially crafted input parameters.
Shell injection
An improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may
CVE-2021-41020
8.8 - High
- May 04, 2022
An improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may allow an authenticated, non privileged attacker to regenerate the CA certificate via the regeneration URL.
An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain
CVE-2020-6649
9.8 - Critical
- February 08, 2021
An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
Insufficient Session Expiration
An improper neutralization of input vulnerability in the URL Description in Fortinet FortiIsolator version 1.2.2
CVE-2020-6643
5.4 - Medium
- March 12, 2020
An improper neutralization of input vulnerability in the URL Description in Fortinet FortiIsolator version 1.2.2 allows a remote authenticated attacker to perform a cross site scripting attack (XSS).
XSS
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Fortinet Fortiisolator or by Fortinet? Click the Watch button to subscribe.