First published: Tue Sep 10 2024(Updated: )
An exposure of sensitive information to an unauthorized actor in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.2 through 3.2.4 and 3.1.5 allows attacker to information disclosure via HTTP get requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | >=3.2.2<4.2.7 | |
Fortinet FortiSandbox Firmware | >=4.4.0<4.4.5 | |
Fortinet FortiSandbox Firmware | =3.1.5 | |
Fortinet FortiSandbox Firmware | >=4.4.0<=4.4.4 | |
Fortinet FortiSandbox Firmware | >=4.2.0<=4.2.6 | |
Fortinet FortiSandbox Firmware | >=4.0 | |
Fortinet FortiSandbox Firmware | >=3.2.2<=3.2.4 | |
Fortinet FortiSandbox Firmware | =. |
Please upgrade to FortiSandbox version 4.4.5 or above Please upgrade to FortiSandbox version 4.2.7 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31490 has a severity rating that indicates a medium risk due to exposure of sensitive information.
To fix CVE-2024-31490, update Fortinet FortiSandbox to version 4.4.5 or above, 4.2.7 or above, or apply other relevant patches.
CVE-2024-31490 affects FortiSandbox versions from 4.4.0 through 4.4.4, 4.2.0 through 4.2.6, 4.0.0 through 4.0.5, 3.2.2 through 3.2.4, and 3.1.5.
CVE-2024-31490 allows an unauthorized actor to perform information disclosure via HTTP GET requests.
There is no documented workaround for CVE-2024-31490, so upgrading to a non-vulnerable version is recommended.