First published: Tue Apr 09 2024(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests..
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | >=4.0.0<4.0.5 | |
Fortinet FortiSandbox Firmware | >=4.2.0<4.2.7 | |
Fortinet FortiSandbox Firmware | >=4.4.0<4.4.4 |
Please upgrade to FortiSandbox version 4.4.4 or above Please upgrade to FortiSandbox version 4.2.7 or above Please upgrade to FortiSandbox version 4.0.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21755 has a critical severity rating due to its potential for unauthorized code execution.
To fix CVE-2024-21755, upgrade Fortinet FortiSandbox to a version later than 4.4.4, 4.2.7, or 4.0.5.
CVE-2024-21755 affects FortiSandbox versions 4.0.0 through 4.0.4, 4.2.0 through 4.2.6, and 4.4.0 through 4.4.3.
CVE-2024-21755 is an OS command injection vulnerability allowing an attacker to execute unauthorized commands.
An attacker can exploit CVE-2024-21755 by sending crafted requests to the vulnerable FortiSandbox versions.