CVE-2026-22628: Execute unauthorized code or commands in Fortinet FortiSwitchAXFixed
An improper access control vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an authenticated admin to execute system commands via a specifically crafted SSH config file.
AI Analysis
Technical Summary
CVE-2026-22628 is a vulnerability identified in Fortinet's FortiSwitchAXFixed product, specifically affecting versions 1.0.0 through 1.0.1. The flaw stems from improper access control mechanisms within the device's handling of SSH configuration files. An authenticated administrator can exploit this vulnerability by providing a specially crafted SSH config file, which the system then processes in a way that allows execution of arbitrary system commands. This could lead to unauthorized code execution, enabling attackers to manipulate system settings, disrupt network operations, or access sensitive information. The vulnerability does not require user interaction beyond authentication, and the attack vector is local (AV:L), meaning the attacker must have legitimate admin credentials. The CVSS v3.1 base score of 5.1 reflects a medium severity level, with low attack complexity and privileges required, but limited scope since it affects only the FortiSwitchAXFixed device. No public exploits or patches are currently documented, but the risk remains significant for environments relying on these devices for network switching and security. The vulnerability impacts confidentiality, integrity, and availability, albeit to a limited degree due to the prerequisite of admin access.
Potential Impact
The impact of CVE-2026-22628 is primarily on organizations using Fortinet FortiSwitchAXFixed devices in their network infrastructure. Successful exploitation could allow an authenticated administrator to execute arbitrary commands, potentially leading to unauthorized configuration changes, disruption of network traffic, or exposure of sensitive data. This could degrade network availability and compromise the integrity of network operations. While the vulnerability requires admin credentials, insider threats or compromised admin accounts could leverage this flaw to escalate privileges or maintain persistence. The medium severity score indicates moderate risk, but in critical environments such as data centers, telecommunications, or enterprise networks, the consequences could be significant. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in core network devices necessitates prompt attention to prevent future exploitation.
Mitigation Recommendations
Organizations should immediately verify if they are running FortiSwitchAXFixed versions 1.0.0 or 1.0.1 and restrict administrative access to trusted personnel only. Implement strict access controls and monitor admin account usage for suspicious activity. Fortinet should be contacted for patches or firmware updates addressing this vulnerability; until then, consider disabling SSH access or limiting it via network segmentation and firewall rules to reduce exposure. Employ multi-factor authentication (MFA) for admin accounts to mitigate risks from credential compromise. Regularly audit SSH configuration files and system logs for unauthorized changes or command executions. Additionally, network administrators should isolate vulnerable devices from untrusted networks and maintain up-to-date backups to enable rapid recovery if exploitation occurs. Finally, maintain vigilance for any future advisories or exploit disclosures related to this CVE.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Singapore, India
CVE-2026-22628: Execute unauthorized code or commands in Fortinet FortiSwitchAXFixed
Description
An improper access control vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an authenticated admin to execute system commands via a specifically crafted SSH config file.
AI-Powered Analysis
Technical Analysis
CVE-2026-22628 is a vulnerability identified in Fortinet's FortiSwitchAXFixed product, specifically affecting versions 1.0.0 through 1.0.1. The flaw stems from improper access control mechanisms within the device's handling of SSH configuration files. An authenticated administrator can exploit this vulnerability by providing a specially crafted SSH config file, which the system then processes in a way that allows execution of arbitrary system commands. This could lead to unauthorized code execution, enabling attackers to manipulate system settings, disrupt network operations, or access sensitive information. The vulnerability does not require user interaction beyond authentication, and the attack vector is local (AV:L), meaning the attacker must have legitimate admin credentials. The CVSS v3.1 base score of 5.1 reflects a medium severity level, with low attack complexity and privileges required, but limited scope since it affects only the FortiSwitchAXFixed device. No public exploits or patches are currently documented, but the risk remains significant for environments relying on these devices for network switching and security. The vulnerability impacts confidentiality, integrity, and availability, albeit to a limited degree due to the prerequisite of admin access.
Potential Impact
The impact of CVE-2026-22628 is primarily on organizations using Fortinet FortiSwitchAXFixed devices in their network infrastructure. Successful exploitation could allow an authenticated administrator to execute arbitrary commands, potentially leading to unauthorized configuration changes, disruption of network traffic, or exposure of sensitive data. This could degrade network availability and compromise the integrity of network operations. While the vulnerability requires admin credentials, insider threats or compromised admin accounts could leverage this flaw to escalate privileges or maintain persistence. The medium severity score indicates moderate risk, but in critical environments such as data centers, telecommunications, or enterprise networks, the consequences could be significant. The lack of known exploits reduces immediate risk, but the presence of this vulnerability in core network devices necessitates prompt attention to prevent future exploitation.
Mitigation Recommendations
Organizations should immediately verify if they are running FortiSwitchAXFixed versions 1.0.0 or 1.0.1 and restrict administrative access to trusted personnel only. Implement strict access controls and monitor admin account usage for suspicious activity. Fortinet should be contacted for patches or firmware updates addressing this vulnerability; until then, consider disabling SSH access or limiting it via network segmentation and firewall rules to reduce exposure. Employ multi-factor authentication (MFA) for admin accounts to mitigate risks from credential compromise. Regularly audit SSH configuration files and system logs for unauthorized changes or command executions. Additionally, network administrators should isolate vulnerable devices from untrusted networks and maintain up-to-date backups to enable rapid recovery if exploitation occurs. Finally, maintain vigilance for any future advisories or exploit disclosures related to this CVE.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2026-01-08T06:49:28.869Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b05634ea502d3aa87d6bca
Added to database: 3/10/2026, 5:34:44 PM
Last enriched: 3/10/2026, 5:53:12 PM
Last updated: 3/13/2026, 5:36:23 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.