Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22578

0
Low
VulnerabilityCVE-2026-22578cvecve-2026-22578
Source: CVE Database V5

Description

CVE-2026-22578 is a vulnerability identifier that has been reserved but subsequently rejected by the assigner, Fortinet. There are no technical details, affected versions, or exploit information available. No CVSS score has been assigned, and no known exploits exist in the wild. Due to the lack of information and the rejected status, this entry does not represent an active or confirmed security threat. Organizations should monitor official advisories for any future updates but currently have no actionable threat related to this CVE.

AI-Powered Analysis

AILast updated: 01/15/2026, 04:43:03 UTC

Technical Analysis

The CVE-2026-22578 entry was reserved by Fortinet on January 7, 2026, but later rejected, indicating that the vulnerability either does not exist, was a duplicate, or was otherwise invalidated. No affected product versions, technical details, or exploit information have been published. The absence of a CVSS score and patch links further supports that this is not an active vulnerability. The rejection status means that this CVE should not be considered a valid security threat at this time. Consequently, there is no technical information to analyze regarding attack vectors, impact, or mitigation.

Potential Impact

Given the rejection of this CVE and lack of technical details, there is no known impact on confidentiality, integrity, or availability. European organizations are not at risk from this non-existent or invalidated vulnerability. No operational or security impact is expected, and no resources need to be allocated to address this CVE specifically.

Mitigation Recommendations

No specific mitigation actions are required for CVE-2026-22578 due to its rejected status and lack of technical details. Organizations should continue to follow best practices for vulnerability management, including monitoring official vendor advisories and threat intelligence feeds for any future valid vulnerabilities. Maintaining up-to-date security patches and configurations remains essential for overall security posture.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2026-01-07T18:30:44.883Z
Cvss Version
null
State
REJECTED

Threat ID: 695f3089c901b0632175e2d4

Added to database: 1/8/2026, 4:20:25 AM

Last enriched: 1/15/2026, 4:43:03 AM

Last updated: 2/6/2026, 5:36:02 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats