First published: Tue Mar 11 2025(Updated: )
A Use of Hard-coded Cryptographic Key vulnerability [CWE-321] in FortiSandbox may allow a privileged attacker with super-admin profile and CLI access to read sensitive data via CLI.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | =. | |
Fortinet FortiSandbox Firmware | >=4.4.0<=4.4.6 | |
Fortinet FortiSandbox Firmware | >=4.2.0<=4.2.7 | |
Fortinet FortiSandbox Firmware | >=4.0.0<=4.0.5 | |
Fortinet FortiSandbox Firmware | >=3.2 | |
Fortinet FortiSandbox Firmware | >=3.1 | |
Fortinet FortiSandbox Firmware | >=3.0.5<=3.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-327 is significant as it allows a privileged attacker to access sensitive data.
To fix FG-IR-24-327, upgrade your FortiSandbox to the latest firmware version as specified in the vendor's advisory.
Affected versions of FortiSandbox include those prior to 5.0.1, 4.4.7, 4.2.8, and 4.0.6 as well as specific ranges in earlier versions.
Only an attacker with super-admin profile and CLI access can exploit FG-IR-24-327.
FG-IR-24-327 is classified as a Use of Hard-coded Cryptographic Key vulnerability.