Platform
fortinet
Component
fortisandbox
Fixed in
4.4.4
4.2.7
4.0.5
CVE-2024-23671 describes a path traversal vulnerability discovered in Fortinet FortiSandbox. This flaw allows an attacker to potentially execute unauthorized code or commands through specially crafted HTTP requests. The vulnerability impacts FortiSandbox versions 4.0.0 through 4.4.3. A patch is available from Fortinet to address this security issue.
The path traversal vulnerability in FortiSandbox allows attackers to bypass access controls and manipulate file paths. By crafting malicious HTTP requests, an attacker can potentially access sensitive files, modify system configurations, or even execute arbitrary code on the affected FortiSandbox appliance. Successful exploitation could lead to complete system compromise, data exfiltration, and disruption of security operations. The impact is amplified if the FortiSandbox appliance is integrated with other critical infrastructure components, potentially enabling lateral movement within the network.
CVE-2024-23671 was publicly disclosed on April 9, 2024. While no active exploitation campaigns have been publicly confirmed, the availability of a path traversal vulnerability significantly increases the risk of exploitation. The vulnerability's ease of exploitation could lead to widespread attacks. Its inclusion in the NVD is pending as of this writing.
Exploit Status
EPSS
0.83% (74% percentile)
CVSS Vector
The primary mitigation for CVE-2024-23671 is to upgrade FortiSandbox to a patched version. Fortinet has released updates to address this vulnerability; refer to their security advisory for specific version details. As a temporary workaround, consider implementing strict input validation on HTTP requests to the FortiSandbox appliance. Web Application Firewalls (WAFs) can be configured with rules to detect and block malicious path traversal attempts. Regularly review FortiSandbox configurations to ensure adherence to security best practices.
Actualice FortiSandbox a una versión posterior a las versiones 4.4.3, 4.2.6 y 4.0.4, según corresponda a su rama de versión. Esto solucionará la vulnerabilidad de path traversal y evitará la ejecución de código no autorizado.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-23671 is a vulnerability in Fortinet FortiSandbox versions 4.0.0–4.4.3 that allows attackers to potentially execute unauthorized code via crafted HTTP requests.
If you are running FortiSandbox versions 4.0.0 through 4.4.3, you are potentially affected by this vulnerability. Check your current version and upgrade as soon as possible.
The recommended fix is to upgrade to a patched version of FortiSandbox. Refer to the official Fortinet security advisory for specific version details and upgrade instructions.
While no active exploitation campaigns have been publicly confirmed, the vulnerability's ease of exploitation increases the risk of attacks. Monitor your systems closely.
Refer to the official Fortinet security advisory for detailed information about CVE-2024-23671 and available patches: [https://www.fortinet.com/security/advisory/fortinet-security-advisory/CVE-2024-23671](https://www.fortinet.com/security/advisory/fortinet-security-advisory/CVE-2024-23671)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.