{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T06:48:57.015","vulnerabilities":[{"cve":{"id":"CVE-2026-22627","sourceIdentifier":"psirt@fortinet.com","published":"2026-03-10T18:18:12.570","lastModified":"2026-04-09T20:54:45.860","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet."},{"lang":"es","value":"Una vulnerabilidad de copia de búfer sin verificar el tamaño de la entrada ('desbordamiento de búfer clásico') en Fortinet FortiSwitchAXFixed 1.0.0 hasta 1.0.1 puede permitir a un atacante no autenticado dentro de la misma red adyacente ejecutar código o comandos no autorizados en el dispositivo mediante el envío de un paquete LLDP manipulado."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortiswitchaxfixed:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.2","matchCriteriaId":"1DE31518-C416-48C9-9B35-CA73232CDBB0"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-086","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}