First published: Tue Aug 03 2021(Updated: )
Multiple instances of heap-based buffer overflow in the command shell of FortiSandbox may allow an authenticated attacker to manipulate memory and alter its content by means of specifically crafted command line arguments.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-20-188 is high due to the potential for authenticated attackers to exploit heap-based buffer overflows.
To fix FG-IR-20-188, update your FortiSandbox to the latest firmware version provided by Fortinet.
FG-IR-20-188 affects multiple versions of the Fortinet FortiSandbox software.
FG-IR-20-188 can be exploited by authenticated attackers using specially crafted command line arguments to manipulate memory.
FG-IR-20-188 can be considered relatively easy to exploit for attackers with valid credentials and knowledge of the command shell.