First published: Tue Aug 03 2021(Updated: )
Multiple instances of heap-based buffer overflow in the command shell of FortiSandbox before 4.0.0 may allow an authenticated attacker to manipulate memory and alter its content by means of specifically crafted command line arguments.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | <=3.1.4 | |
Fortinet FortiSandbox | >=3.2.0<3.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this heap-based buffer overflow is CVE-2021-26096.
The affected software is FortiSandbox versions up to and including 3.1.4, and versions between 3.2.0 and 3.2.3.
The severity of CVE-2021-26096 is rated as high with a CVSS score of 8.8.
An authenticated attacker can exploit this vulnerability by manipulating memory and altering its content through specifically crafted command line arguments.
Yes, Fortinet has released FortiSandbox version 4.0.0 which addresses this vulnerability. It is recommended to upgrade to this version to fix the issue.