Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
fortianalyzer Vendor: fortinet

About This Product

fortianalyzer is a software product offered by fortinet. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 90 known vulnerabilities affecting fortinet fortianalyzer. This includes 3 critical-severity issues and 24 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2016 to 2026, indicating a sustained research interest and ongoing security attention. 56 medium-severity issues and 7 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2015-7363 2016-10-07 2025-04-12 5.4 3.5 Unknown
CVE-2018-1354 2018-06-27 2024-11-21 6.5 4.0 Likely
CVE-2018-1355 2018-06-27 2024-11-21 6.1 5.8 Likely
CVE-2018-13375 2019-05-28 2024-11-21 6.1 4.3 Likely
CVE-2019-17657 2020-04-07 2024-11-21 7.5 5.0 Likely
CVE-2020-6640 2020-06-04 2024-11-21 5.4 3.5 Unknown
CVE-2020-9289 2020-06-16 2024-11-21 7.5 5.0 Likely
CVE-2020-12817 2020-09-24 2024-11-21 8.8 6.5 Likely
CVE-2020-12811 2020-09-24 2024-11-21 6.1 4.3 Likely
CVE-2020-12815 2020-09-24 2024-11-21 5.4 3.5 Unknown
CVE-2021-24022 2021-07-20 2024-11-21 6.7 2.1 Unknown
CVE-2021-32598 2021-08-05 2024-11-21 4.3 4.0 Likely
CVE-2021-32603 2021-08-05 2024-11-21 8.8 4.0 Likely
CVE-2021-32587 2021-08-06 2024-11-21 4.3 4.0 Likely
CVE-2021-32597 2021-08-06 2024-11-21 4.6 3.5 Unknown
CVE-2021-24021 2021-10-06 2024-11-21 4.3 3.5 Unknown
CVE-2021-36170 2021-10-06 2024-11-21 3.2 2.1 Unknown
CVE-2020-12814 2021-11-02 2024-11-21 4.1 3.5 Unknown
CVE-2021-42757 2021-12-08 2025-10-16 6.7 4.6 Unknown
CVE-2022-22300 2022-03-01 2024-11-21 4.3 6.5 Likely
CVE-2021-26104 2022-04-06 2024-11-21 7.8 7.2 Unknown
CVE-2022-26118 2022-07-18 2024-11-21 6.7 - -
CVE-2022-27483 2022-07-19 2024-11-21 7.2 - -
CVE-2022-26121 2022-10-10 2024-11-21 3.7 - -
CVE-2022-39950 2022-11-02 2024-11-21 8.0 - -
CVE-2022-38377 2022-11-25 2024-11-21 4.3 - -
CVE-2022-30304 2023-02-16 2024-11-21 4.3 - -
CVE-2022-27490 2023-03-07 2024-11-21 5.4 - -
CVE-2023-23776 2023-03-07 2024-11-21 4.6 - -
CVE-2023-25611 2023-03-07 2024-11-21 4.0 - -
CVE-2022-42477 2023-04-11 2024-11-21 7.1 - -
CVE-2023-22642 2023-04-11 2024-11-21 7.5 - -
CVE-2023-25609 2023-06-13 2024-11-21 4.3 - -
CVE-2023-25606 2023-07-11 2024-11-21 6.5 - -
CVE-2021-43072 2023-07-18 2024-11-21 6.7 - -
CVE-2022-22305 2023-09-01 2024-11-21 5.4 - -
CVE-2023-36638 2023-09-13 2024-11-21 4.3 - -
CVE-2023-25607 2023-10-10 2024-11-21 7.8 - -
CVE-2023-41838 2023-10-10 2024-11-21 7.1 - -
CVE-2023-42782 2023-10-10 2024-11-21 5.3 - -
CVE-2023-42787 2023-10-10 2024-11-21 6.5 - -
CVE-2023-42788 2023-10-10 2024-11-21 7.8 - -
CVE-2023-44249 2023-10-10 2024-11-21 4.3 - -
CVE-2023-44256 2023-10-20 2024-11-21 6.5 - -
CVE-2023-40719 2023-11-14 2024-11-21 4.1 - -
CVE-2023-44253 2024-02-15 2024-11-21 5.0 - -
CVE-2023-41842 2024-03-12 2026-01-14 6.7 - -
CVE-2024-21757 2024-08-13 2024-08-22 6.1 - -
CVE-2023-44254 2024-09-10 2024-12-12 5.0 - -
CVE-2024-45330 2024-10-08 2024-10-19 7.2 - -
CVE-2023-44255 2024-11-12 2025-01-21 4.1 - -
CVE-2024-23666 2024-11-12 2025-01-21 7.5 - -
CVE-2024-31496 2024-11-12 2025-01-21 6.7 - -
CVE-2024-32116 2024-11-12 2025-01-21 5.1 - -
CVE-2024-32117 2024-11-12 2025-01-21 4.9 - -
CVE-2024-32118 2024-11-12 2025-01-17 6.7 - -
CVE-2024-33505 2024-11-12 2025-01-31 5.6 - -
CVE-2024-35274 2024-11-12 2025-01-17 2.3 - -
CVE-2021-32589 2024-12-19 2025-01-31 8.1 - -
CVE-2024-33502 2025-01-14 2025-01-21 6.5 - -
CVE-2024-33503 2025-01-14 2025-01-31 6.7 - -
CVE-2024-35273 2025-01-14 2025-01-31 7.2 - -
CVE-2024-35275 2025-01-14 2025-01-31 6.6 - -
CVE-2024-35276 2025-01-14 2025-01-31 5.6 - -
CVE-2024-36512 2025-01-14 2025-01-31 7.2 - -
CVE-2024-48886 2025-01-14 2025-02-03 9.0 - -
CVE-2024-45331 2025-01-16 2025-02-03 7.3 - -
CVE-2024-50563 2025-01-16 2025-09-24 7.3 - -
CVE-2024-36508 2025-02-11 2025-07-24 6.0 - -
CVE-2024-40584 2025-02-11 2025-07-22 7.2 - -
CVE-2024-52966 2025-02-11 2025-07-22 2.3 - -
CVE-2024-32123 2025-03-11 2025-07-24 6.7 - -
CVE-2024-33501 2025-03-11 2025-07-24 4.2 - -
CVE-2024-40585 2025-03-14 2025-07-23 6.5 - -
CVE-2023-25610 2025-03-24 2025-07-24 9.8 - -
CVE-2024-26013 2025-04-08 2025-07-25 7.5 - -
CVE-2024-50565 2025-04-08 2025-07-25 3.1 - -
CVE-2024-52962 2025-04-08 2025-07-23 5.3 - -
CVE-2025-24474 2025-07-08 2025-07-22 2.7 - -
CVE-2024-50571 2025-10-14 2026-01-27 7.2 - -
CVE-2025-53845 2025-10-14 2025-10-15 6.5 - -
CVE-2025-54973 2025-10-14 2025-10-22 5.3 - -
CVE-2024-40593 2025-12-11 2025-12-12 6.0 - -
CVE-2026-24858 2026-01-27 2026-01-29 9.8 - -
CVE-2025-48418 2026-03-10 2026-03-12 6.7 - -
CVE-2025-49784 2026-03-10 2026-03-12 6.0 - -
CVE-2025-68482 2026-03-10 2026-03-12 6.9 - -
CVE-2025-68648 2026-03-10 2026-03-13 7.2 - -
CVE-2026-22572 2026-03-10 2026-03-16 7.2 - -
CVE-2026-22629 2026-03-10 2026-03-13 3.7 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for fortinet fortianalyzer by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.