First published: Tue Jan 14 2025(Updated: )
An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in Fortinet FortiSandbox version 4.4.0 through 4.4.4, 4.2.0 through 4.2.6 and below 4.0.4 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | >=4.4.0<=4.4.4>=4.2.0<4.2.6<4.0.4 | |
Fortinet FortiSandbox Firmware | >=3.0.5<4.0.5 | |
Fortinet FortiSandbox Firmware | >=4.2.0<4.2.7 | |
Fortinet FortiSandbox Firmware | >=4.4.0<4.4.5 |
Please upgrade to FortiSandbox Cloud version 24.1 or above Please upgrade to FortiSandbox version 4.4.5 or above Please upgrade to FortiSandbox version 4.2.7 or above Please upgrade to FortiSandbox version 4.0.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27778 is classified as a high severity vulnerability due to its potential for unauthorized command execution.
To fix CVE-2024-27778, upgrade Fortinet FortiSandbox to version 4.4.5 or above, 4.2.7 or above, or any version above 4.0.4.
CVE-2024-27778 is an OS Command Injection vulnerability that arises from improper neutralization of special elements.
An authenticated attacker with at least read-only permission can exploit CVE-2024-27778 to execute unauthorized commands.
Fortinet FortiSandbox versions 4.4.0 through 4.4.4, 4.2.0 through 4.2.6, and below 4.0.4 are affected by CVE-2024-27778.