First published: Tue Mar 11 2025(Updated: )
A client-side enforcement of server-side security vulnerability [CWE-602] in FortiSandbox may allow an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | =. | |
Fortinet FortiSandbox Firmware | >=4.4.0<=4.4.6 | |
Fortinet FortiSandbox Firmware | >=4.2.0<=4.2.7 | |
Fortinet FortiSandbox Firmware | >=4.0 | |
Fortinet FortiSandbox Firmware | >=3.2 | |
Fortinet FortiSandbox Firmware | >=3.1 | |
Fortinet FortiSandbox Firmware | >=3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-305 is critically concerning due to its potential for unauthorized command execution by authenticated attackers.
To fix FG-IR-24-305, update FortiSandbox to the latest version provided by Fortinet that includes the appropriate remedies.
FG-IR-24-305 affects users of FortiSandbox versions 4.0 and earlier, as well as specific versions identified between 4.2.0 to 4.2.7, 4.4.0 to 4.4.6, and 5.0.1 and beyond.
Risks associated with FG-IR-24-305 include the possibility of attackers executing unauthorized commands which may compromise system integrity and security.
Yes, FG-IR-24-305 is a client-side enforcement of server-side security vulnerability, allowing exploitation through crafted requests.