First published: Tue Sep 07 2021(Updated: )
An improper input validation vulnerability in the sniffer interface of FortiSandbox may allow an authenticated attacker to silently halt the sniffer via specifically crafted requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-20-178 is considered medium due to the potential for authenticated attackers to exploit the vulnerability.
To fix FG-IR-20-178, update the FortiSandbox to the latest firmware version as recommended by Fortinet.
FG-IR-20-178 can be exploited through specially crafted requests by an authenticated attacker to halt the sniffer interface.
FG-IR-20-178 affects users of FortiSandbox firmware versions where the sniffer interface is utilized.
FG-IR-20-178 is not classified as a zero-day vulnerability since it has been publicly disclosed and a fix is available.