First published: Tue Mar 11 2025(Updated: )
A client-side enforcement of server-side security vulnerability [CWE-602] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | >=4.4.0<4.4.6<4.2.7 | |
Fortinet FortiSandbox Firmware | =. | |
Fortinet FortiSandbox Firmware | >=4.4.0<=4.4.6 | |
Fortinet FortiSandbox Firmware | >=4.2.0<=4.2.7 | |
Fortinet FortiSandbox Firmware | >=4.0 | |
Fortinet FortiSandbox Firmware | >=3.2 | |
Fortinet FortiSandbox Firmware | >=3.1 | |
Fortinet FortiSandbox Firmware | >=3.0 |
Please upgrade to FortiSandbox version 5.0.1 or above Please upgrade to FortiSandbox version 4.4.7 or above Please upgrade to FortiSandbox version 4.2.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52960 is classified as a client-side enforcement of server-side security vulnerability with moderate severity.
To mitigate CVE-2024-52960, upgrade Fortinet FortiSandbox to version 5.0.1 or higher, or 4.4.7 or higher for versions 4.4.0 through 4.4.6, and 4.2.8 or higher for versions from 4.2.0 to 4.2.7.
Fortinet FortiSandbox versions 4.4.0 through 4.4.6 and all versions prior to 4.2.7 are affected by CVE-2024-52960.
No, only an authenticated user with at least read-only permissions can exploit CVE-2024-52960.
CVE-2024-52960 is a client-side enforcement of server-side security vulnerability, indicating that it allows unauthorized commands to be executed via crafted requests.