Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
fortiproxy Vendor: fortinet

About This Product

fortiproxy is a software product offered by fortinet. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 116 known vulnerabilities affecting fortinet fortiproxy. This includes 16 critical-severity issues and 31 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2019 to 2026, indicating a sustained research interest and ongoing security attention. 58 medium-severity issues and 11 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-13383 2019-05-29 2025-10-24 4.3 4.3 Likely
CVE-2018-13379 2019-06-04 2025-10-24 9.1 5.0 Likely
CVE-2018-13380 2019-06-04 2024-11-21 4.7 4.3 Likely
CVE-2018-13381 2019-06-04 2024-11-21 5.3 5.0 Likely
CVE-2018-13382 2019-06-04 2025-10-24 9.1 5.0 Likely
CVE-2020-6648 2020-10-21 2024-11-21 5.3 4.0 Likely
CVE-2021-22128 2021-03-04 2024-11-21 7.1 4.0 Likely
CVE-2019-17656 2021-04-12 2024-11-21 5.4 4.0 Likely
CVE-2021-22130 2021-06-03 2024-11-21 6.7 4.0 Likely
CVE-2021-26110 2021-12-08 2024-11-21 7.8 4.6 Unknown
CVE-2021-42757 2021-12-08 2025-10-16 6.7 4.6 Unknown
CVE-2021-26103 2021-12-08 2024-11-21 6.3 5.1 Unknown
CVE-2021-41024 2021-12-08 2024-11-21 7.5 5.0 Likely
CVE-2021-26092 2022-02-24 2024-11-21 4.7 4.3 Likely
CVE-2021-43206 2022-05-04 2024-11-21 4.3 4.3 Likely
CVE-2021-43081 2022-05-11 2024-11-21 6.1 4.3 Likely
CVE-2021-42755 2022-07-18 2024-11-21 4.3 - -
CVE-2021-44170 2022-07-18 2024-11-21 6.7 - -
CVE-2022-22299 2022-08-05 2024-11-21 7.8 - -
CVE-2022-40684 2022-10-18 2026-01-14 9.8 - -
CVE-2022-29055 2022-10-18 2024-11-21 7.5 - -
CVE-2022-35843 2022-12-06 2024-11-21 8.1 - -
CVE-2022-42475 2023-01-02 2025-10-24 9.8 - -
CVE-2021-43074 2023-02-16 2024-11-21 4.3 - -
CVE-2022-29054 2023-02-16 2024-11-21 3.3 - -
CVE-2022-38378 2023-02-16 2024-11-21 4.2 - -
CVE-2022-39948 2023-02-16 2024-11-21 4.8 - -
CVE-2022-41335 2023-02-16 2024-11-21 8.8 - -
CVE-2022-42472 2023-02-16 2024-11-21 4.2 - -
CVE-2022-41329 2023-03-07 2024-11-21 5.3 - -
CVE-2022-42476 2023-03-07 2024-11-21 8.2 - -
CVE-2022-45861 2023-03-07 2024-11-21 6.5 - -
CVE-2022-41330 2023-04-11 2024-11-21 8.8 - -
CVE-2022-41331 2023-04-11 2024-11-21 9.8 - -
CVE-2022-43947 2023-04-11 2024-11-21 5.0 - -
CVE-2023-22641 2023-04-11 2024-11-21 4.1 - -
CVE-2023-22640 2023-05-03 2024-11-21 7.5 - -
CVE-2022-41327 2023-06-13 2024-11-21 7.8 - -
CVE-2022-42474 2023-06-13 2024-11-21 6.5 - -
CVE-2022-43953 2023-06-13 2024-11-21 6.7 - -
CVE-2023-22639 2023-06-13 2024-11-21 6.7 - -
CVE-2023-26207 2023-06-13 2024-11-21 3.3 - -
CVE-2023-27997 2023-06-13 2025-10-24 9.8 - -
CVE-2023-29175 2023-06-13 2024-11-21 4.8 - -
CVE-2023-29178 2023-06-13 2024-11-21 4.3 - -
CVE-2023-33305 2023-06-13 2024-11-21 4.9 - -
CVE-2023-33306 2023-06-16 2024-11-21 6.5 - -
CVE-2023-33307 2023-06-16 2024-11-21 6.5 - -
CVE-2021-43072 2023-07-18 2024-11-21 6.7 - -
CVE-2023-33308 2023-07-26 2024-11-21 9.8 - -
CVE-2023-29183 2023-09-13 2024-11-21 8.0 - -
CVE-2023-41675 2023-10-10 2024-11-21 5.3 - -
CVE-2023-28002 2023-11-14 2024-11-21 6.4 - -
CVE-2023-36641 2023-11-14 2024-11-21 6.5 - -
CVE-2023-36639 2023-12-13 2024-11-21 7.2 - -
CVE-2023-47536 2023-12-13 2024-11-21 3.1 - -
CVE-2023-44250 2024-01-10 2024-11-21 8.8 - -
CVE-2024-21762 2024-02-09 2025-10-24 9.8 - -
CVE-2024-23113 2024-02-15 2025-10-24 9.8 - -
CVE-2023-29179 2024-02-22 2024-12-10 6.5 - -
CVE-2023-29180 2024-02-22 2024-12-10 7.5 - -
CVE-2023-29181 2024-02-22 2024-12-10 8.8 - -
CVE-2023-42789 2024-03-12 2024-11-21 9.8 - -
CVE-2023-42790 2024-03-12 2024-11-21 8.1 - -
CVE-2024-23112 2024-03-12 2024-11-21 8.0 - -
CVE-2023-41677 2024-04-09 2024-12-12 7.5 - -
CVE-2023-36640 2024-05-14 2024-11-21 6.7 - -
CVE-2023-45583 2024-05-14 2024-11-21 6.7 - -
CVE-2023-45586 2024-05-14 2024-11-21 5.0 - -
CVE-2024-21754 2024-06-11 2024-11-21 1.8 - -
CVE-2024-23111 2024-06-11 2024-11-21 6.8 - -
CVE-2024-26010 2024-06-11 2024-12-11 7.5 - -
CVE-2024-26015 2024-07-09 2024-11-21 3.4 - -
CVE-2022-45862 2024-08-13 2024-08-22 3.7 - -
CVE-2024-26011 2024-11-12 2024-12-12 5.3 - -
CVE-2024-33510 2024-11-12 2025-01-17 4.3 - -
CVE-2024-48884 2025-01-14 2026-01-14 7.5 - -
CVE-2024-48886 2025-01-14 2025-02-03 9.0 - -
CVE-2024-54021 2025-01-14 2025-08-08 6.5 - -
CVE-2024-55591 2025-01-14 2025-10-24 9.8 - -
CVE-2022-23439 2025-01-22 2026-01-14 4.7 - -
CVE-2023-40721 2025-02-11 2026-01-14 6.7 - -
CVE-2025-24472 2025-02-11 2025-10-24 8.1 - -
CVE-2024-45324 2025-03-11 2025-07-24 7.2 - -
CVE-2024-26006 2025-03-14 2025-07-24 7.5 - -
CVE-2019-15706 2025-03-17 2025-07-24 4.1 - -
CVE-2023-25610 2025-03-24 2025-07-24 9.8 - -
CVE-2023-37930 2025-04-08 2026-01-14 7.5 - -
CVE-2024-26013 2025-04-08 2025-07-25 7.5 - -
CVE-2024-50565 2025-04-08 2025-07-25 3.1 - -
CVE-2025-22252 2025-05-28 2025-06-04 9.8 - -
CVE-2023-29184 2025-06-10 2025-07-24 3.2 - -
CVE-2024-50568 2025-06-10 2025-07-25 5.9 - -
CVE-2025-22254 2025-06-10 2026-01-14 6.6 - -
CVE-2024-52965 2025-07-08 2025-07-22 7.2 - -
CVE-2024-55599 2025-07-08 2025-07-22 5.3 - -
CVE-2023-45584 2025-08-12 2026-01-14 6.6 - -
CVE-2024-26009 2025-08-12 2025-08-14 8.1 - -
CVE-2025-25248 2025-08-12 2025-08-14 5.3 - -
CVE-2025-22862 2025-10-02 2025-10-15 6.7 - -
CVE-2023-46718 2025-10-14 2025-10-16 6.7 - -
CVE-2024-26008 2025-10-14 2025-10-15 5.3 - -
CVE-2024-47569 2025-10-14 2026-01-14 4.3 - -
CVE-2024-50571 2025-10-14 2026-01-27 7.2 - -
CVE-2025-22258 2025-10-14 2025-10-15 6.5 - -
CVE-2025-25253 2025-10-14 2025-10-15 7.5 - -
CVE-2025-25255 2025-10-14 2026-01-14 5.3 - -
CVE-2025-31366 2025-10-14 2026-01-14 4.7 - -
CVE-2025-31514 2025-10-14 2025-10-15 2.7 - -
CVE-2025-47890 2025-10-14 2026-01-14 2.6 - -
CVE-2025-54822 2025-10-14 2026-01-14 4.3 - -
CVE-2025-57740 2025-10-14 2025-10-15 7.5 - -
CVE-2025-54821 2025-11-18 2026-01-14 1.9 - -
CVE-2024-47570 2025-12-09 2025-12-10 6.6 - -
CVE-2025-59718 2025-12-09 2025-12-17 9.8 - -
CVE-2026-24858 2026-01-27 2026-01-29 9.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for fortinet fortiproxy by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.