CVE-2026-22627
Published: 10 March 2026
Summary
CVE-2026-22627 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Fortinet Fortiswitchaxfixed. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 9.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly mitigates this buffer overflow vulnerability by applying vendor patches as specified in the Fortinet advisory.
Information input validation enforces size checks on LLDP packets to prevent buffer overflows from crafted inputs.
Memory protection mechanisms like stack canaries and non-executable stacks mitigate unauthorized code execution from buffer overflow exploits.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in LLDP packet handling on adjacent network enables remote code execution via exploitation of the device's network protocol service.
NVD Description
A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a…
more
crafted LLDP packet.
Deeper analysisAI
CVE-2026-22627 is a classic buffer overflow vulnerability (CWE-120) affecting Fortinet FortiSwitchAXFixed versions 1.0.0 through 1.0.1. The flaw arises from a buffer copy without checking the size of input, which can be triggered via specially crafted packets. It has a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for confidentially, integrity, and availability impacts.
An unauthenticated attacker on the same adjacent network can exploit this vulnerability by sending a crafted LLDP packet to the device. Successful exploitation may allow the attacker to execute unauthorized code or commands, potentially leading to full device compromise.
The Fortinet PSIRT advisory at https://fortiguard.fortinet.com/psirt/FG-IR-26-086 provides details on mitigation strategies and available patches. Security practitioners should consult this reference for version-specific remediation guidance.
Details
- CWE(s)