Home

Description

An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4 all versions, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all versions, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4 all versions, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions, FortiManager Cloud 6.4 all versions may allow an attacker to bypass bruteforce protections via exploitation of race conditions. The latter raises the complexity of practical exploitation.

PUBLISHED Reserved 2026-01-08 | Published 2026-03-10 | Updated 2026-03-12 | Assigner fortinet




LOW: 3.4CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:C

Problem types

Improper access control

Product status

Default status
unaffected

7.6.0 (semver)
affected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

6.4.0 (semver)
affected

Default status
unaffected

7.6.2
affected

7.4.1 (semver)
affected

7.2.1 (semver)
affected

7.0.1 (semver)
affected

6.4.1 (semver)
affected

Default status
unaffected

7.6.0 (semver)
affected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

6.4.0 (semver)
affected

Default status
unaffected

7.6.2 (semver)
affected

7.4.1 (semver)
affected

7.2.1 (semver)
affected

7.0.1 (semver)
affected

6.4.1 (semver)
affected

References

fortiguard.fortinet.com/psirt/FG-IR-26-079

cve.org (CVE-2026-22629)

nvd.nist.gov (CVE-2026-22629)

Download JSON