First published: Tue Aug 03 2021(Updated: )
An instance of small space of random values in FortiSandbox RPC API may allow an attacker in possession of a few information pieces about the state of the device to possibly predict valid session IDs.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-20-218 is classified as medium due to the potential for session ID prediction.
To fix FG-IR-20-218, ensure that your FortiSandbox system is updated to the latest firmware version that addresses this vulnerability.
The potential consequences of FG-IR-20-218 include unauthorized access to sessions if session IDs are successfully predicted.
FG-IR-20-218 affects users of Fortinet FortiSandbox running vulnerable versions of its firmware.
There is no public indication that FG-IR-20-218 is being actively exploited, but it is advisable to mitigate the risk by applying updates.