Cyber Posture

CVE-2026-22828

HighUpdated

Published: 14 April 2026

Published
14 April 2026
Modified
01 May 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22828 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Fortinet Fortianalyzer Cloud. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the heap-based buffer overflow vulnerability by identifying, patching, and testing updates for affected Fortinet FortiAnalyzer and FortiManager Cloud versions.

prevent

Validates specifically crafted requests to prevent improper handling that leads to the heap buffer overflow and remote code execution.

prevent

Implements memory protection mechanisms like ASLR and bounds checking to mitigate heap-based buffer overflow exploitation attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Heap-based buffer overflow in public-facing Fortinet cloud services (FortiAnalyzer/FortiManager Cloud) enables remote unauthenticated RCE via crafted network requests, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A heap-based buffer overflow vulnerability in Fortinet FortiAnalyzer Cloud 7.6.2 through 7.6.4, FortiManager Cloud 7.6.2 through 7.6.4 may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. Successful exploitation would require a large amount…

more

of effort in preparation because of ASLR and network segmentation

Deeper analysisAI

CVE-2026-22828 is a heap-based buffer overflow vulnerability (CWE-122) affecting Fortinet FortiAnalyzer Cloud versions 7.6.2 through 7.6.4 and FortiManager Cloud versions 7.6.2 through 7.6.4. The flaw arises from improper handling of specifically crafted requests, potentially leading to remote code execution. It has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting high impact but elevated attack complexity.

A remote unauthenticated attacker could exploit this vulnerability over the network by sending tailored requests to affected cloud instances. Successful exploitation may enable arbitrary code or command execution, compromising confidentiality, integrity, and availability. However, preparation demands significant effort due to protections like ASLR and network segmentation.

The Fortinet advisory FG-IR-26-121 provides details on mitigation, including recommended patches and workarounds; security practitioners should consult https://fortiguard.fortinet.com/psirt/FG-IR-26-121 for version-specific remediation guidance.

Details

CWE(s)

Affected Products

fortinet
fortianalyzer cloud
7.6.2 — 7.6.5
fortinet
fortimanager cloud
7.6.2 — 7.6.5

CVEs Like This One

CVE-2025-61848Same product: Fortinet Fortianalyzer Cloud
CVE-2024-35276Same product: Fortinet Fortianalyzer Cloud
CVE-2024-40584Same product: Fortinet Fortianalyzer Cloud
CVE-2024-35277Same product: Fortinet Fortimanager Cloud
CVE-2024-50563Same product: Fortinet Fortianalyzer Cloud
CVE-2025-25249Same vendor: Fortinet
CVE-2024-50566Same product: Fortinet Fortimanager Cloud
CVE-2024-36512Same vendor: Fortinet
CVE-2024-26009Same vendor: Fortinet
CVE-2024-35279Same vendor: Fortinet

References