CVE-2026-22627: Execute unauthorized code or commands in Fortinet FortiSwitchAXFixed
A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet.
AI Analysis
Technical Summary
CVE-2026-22627 is a classic buffer overflow vulnerability identified in Fortinet's FortiSwitchAXFixed product, specifically affecting versions 1.0.0 through 1.0.1. The flaw exists due to a buffer copy operation that does not properly verify the size of incoming data, allowing an attacker to overflow the buffer by sending a crafted Link Layer Discovery Protocol (LLDP) packet. LLDP is a network protocol used for device discovery on local networks, and the vulnerability can be exploited by an unauthenticated attacker positioned on the same adjacent network segment as the target device. Successful exploitation enables the attacker to execute arbitrary code or commands on the affected device, potentially leading to full compromise. The vulnerability has a CVSS v3.1 base score of 7.7, reflecting high severity, with attack vector classified as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated high, indicating that exploitation could lead to complete device takeover, data leakage, or disruption of network operations. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a critical concern for organizations using FortiSwitchAXFixed devices. Fortinet has not yet provided patch links, so mitigation currently relies on network controls and monitoring.
Potential Impact
The vulnerability poses a significant risk to organizations deploying FortiSwitchAXFixed devices, particularly in enterprise, data center, and critical infrastructure environments. Exploitation can lead to unauthorized code execution, enabling attackers to gain control over network switches, manipulate traffic, intercept sensitive data, or disrupt network availability. This can result in severe confidentiality breaches, integrity violations through unauthorized configuration changes, and denial of service conditions. Given that the attack requires only network adjacency and no authentication, attackers who gain access to the local network segment—such as malicious insiders, compromised devices, or attackers who have breached perimeter defenses—can exploit this flaw. The widespread use of Fortinet products in sectors like finance, government, telecommunications, and healthcare increases the potential impact. Additionally, compromised switches can serve as footholds for lateral movement within networks, escalating the threat to broader organizational assets.
Mitigation Recommendations
Organizations should immediately implement network segmentation to isolate FortiSwitchAXFixed devices and restrict LLDP traffic to trusted management stations and devices only. Deploy access control lists (ACLs) or firewall rules to block unauthorized LLDP packets from untrusted sources. Monitor network traffic for anomalous or malformed LLDP packets indicative of exploitation attempts. Fortinet users should stay alert for official patches or firmware updates addressing this vulnerability and apply them promptly once available. Until patches are released, consider disabling LLDP on interfaces where it is not strictly necessary. Conduct thorough network device audits to identify all affected FortiSwitchAXFixed devices and prioritize remediation efforts. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting LLDP-based buffer overflows. Finally, maintain robust incident response plans to quickly contain and remediate any compromise resulting from this vulnerability.
Affected Countries
United States, China, Germany, United Kingdom, France, Japan, South Korea, India, Australia, Canada
CVE-2026-22627: Execute unauthorized code or commands in Fortinet FortiSwitchAXFixed
Description
A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-22627 is a classic buffer overflow vulnerability identified in Fortinet's FortiSwitchAXFixed product, specifically affecting versions 1.0.0 through 1.0.1. The flaw exists due to a buffer copy operation that does not properly verify the size of incoming data, allowing an attacker to overflow the buffer by sending a crafted Link Layer Discovery Protocol (LLDP) packet. LLDP is a network protocol used for device discovery on local networks, and the vulnerability can be exploited by an unauthenticated attacker positioned on the same adjacent network segment as the target device. Successful exploitation enables the attacker to execute arbitrary code or commands on the affected device, potentially leading to full compromise. The vulnerability has a CVSS v3.1 base score of 7.7, reflecting high severity, with attack vector classified as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated high, indicating that exploitation could lead to complete device takeover, data leakage, or disruption of network operations. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a critical concern for organizations using FortiSwitchAXFixed devices. Fortinet has not yet provided patch links, so mitigation currently relies on network controls and monitoring.
Potential Impact
The vulnerability poses a significant risk to organizations deploying FortiSwitchAXFixed devices, particularly in enterprise, data center, and critical infrastructure environments. Exploitation can lead to unauthorized code execution, enabling attackers to gain control over network switches, manipulate traffic, intercept sensitive data, or disrupt network availability. This can result in severe confidentiality breaches, integrity violations through unauthorized configuration changes, and denial of service conditions. Given that the attack requires only network adjacency and no authentication, attackers who gain access to the local network segment—such as malicious insiders, compromised devices, or attackers who have breached perimeter defenses—can exploit this flaw. The widespread use of Fortinet products in sectors like finance, government, telecommunications, and healthcare increases the potential impact. Additionally, compromised switches can serve as footholds for lateral movement within networks, escalating the threat to broader organizational assets.
Mitigation Recommendations
Organizations should immediately implement network segmentation to isolate FortiSwitchAXFixed devices and restrict LLDP traffic to trusted management stations and devices only. Deploy access control lists (ACLs) or firewall rules to block unauthorized LLDP packets from untrusted sources. Monitor network traffic for anomalous or malformed LLDP packets indicative of exploitation attempts. Fortinet users should stay alert for official patches or firmware updates addressing this vulnerability and apply them promptly once available. Until patches are released, consider disabling LLDP on interfaces where it is not strictly necessary. Conduct thorough network device audits to identify all affected FortiSwitchAXFixed devices and prioritize remediation efforts. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics capable of detecting exploitation attempts targeting LLDP-based buffer overflows. Finally, maintain robust incident response plans to quickly contain and remediate any compromise resulting from this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2026-01-08T06:49:28.868Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b05634ea502d3aa87d6bc7
Added to database: 3/10/2026, 5:34:44 PM
Last enriched: 3/17/2026, 6:55:54 PM
Last updated: 4/28/2026, 5:12:08 AM
Views: 123
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.