First published: Tue Aug 03 2021(Updated: )
An improper access control vulnerability (CWE-284) in FortiSandbox may allow an authenticated, unprivileged attacker to download the device configuration file via the recovery URL.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-20-071 is classified as high due to the improper access control vulnerability allowing unprivileged attackers to download sensitive configuration files.
To fix FG-IR-20-071, ensure that the device is updated to the latest FortiSandbox firmware version that addresses this vulnerability.
Authenticated, unprivileged attackers can exploit FG-IR-20-071 to gain access to restricted configuration files.
Failing to address FG-IR-20-071 could lead to unauthorized access to sensitive device configurations, compromising the security of the affected system.
Yes, FG-IR-20-071 specifically affects the Fortinet FortiSandbox product.