First published: Wed Jul 07 2021(Updated: )
A concurrent execution using shared resource with improper synchronization ('race condition') in the command shell of FortiSandbox may allow an authenticated attacker to bring the system into an unresponsive state via specifically orchestrated sequences of commands.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-20-185 is classified as high due to the potential for an authenticated attacker to cause a denial of service.
To fix FG-IR-20-185, apply the latest firmware updates from Fortinet for FortiSandbox.
FG-IR-20-185 affects Fortinet FortiSandbox systems that are running vulnerable firmware.
FG-IR-20-185 describes a race condition attack that can render the FortiSandbox system unresponsive.
FG-IR-20-185 can be exploited by authenticated attackers who can execute orchestrated command sequences.