First published: Tue Apr 09 2024(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests..
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | >=4.0.0<4.0.5 | |
Fortinet FortiSandbox Firmware | >=4.2.0<4.2.7 | |
Fortinet FortiSandbox Firmware | >=4.4.0<4.4.4 |
Please upgrade to FortiSandbox version 4.4.4 or above Please upgrade to FortiSandbox version 4.2.7 or above Please upgrade to FortiSandbox version 4.0.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21756 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2024-21756, you should update Fortinet FortiSandbox to the latest version that is not affected by this vulnerability.
CVE-2024-21756 affects Fortinet FortiSandbox versions 4.0.0 through 4.0.4, 4.2.0 through 4.2.6, and 4.4.0 through 4.4.3.
CVE-2024-21756 is an OS command injection vulnerability that allows attackers to execute unauthorized commands.
Organizations using vulnerable versions of Fortinet FortiSandbox are at risk of exploitation due to CVE-2024-21756.