First published: Tue Apr 09 2024(Updated: )
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.0.5 through 3.0.7 may allows attacker to execute unauthorized code or commands via CLI.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | >=3.0.5<=3.0.7 | |
Fortinet FortiSandbox Firmware | >=3.2.0<4.2.7 | |
Fortinet FortiSandbox Firmware | >=4.4.0<4.4.3 |
Please upgrade to FortiSandbox version 4.4.3 or above Please upgrade to FortiSandbox version 4.2.7 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47540 is rated as a critical vulnerability due to its potential for os command injection leading to unauthorized code execution.
To fix CVE-2023-47540, upgrade Fortinet FortiSandbox to a version above 4.4.2, 4.2.6, 4.0.5, or 3.2.4.
CVE-2023-47540 affects FortiSandbox versions 3.0.5 through 3.0.7, 4.0.0 through 4.0.5, 4.2.0 through 4.2.6, and 4.4.0 through 4.4.2.
The potential impacts of CVE-2023-47540 include unauthorized access and execution of arbitrary commands on affected systems.
Currently, Fortinet recommends upgrading to secure versions as the primary mitigation for CVE-2023-47540, with no official workaround provided.