A client-side enforcement of server-side security vulnerability [CWE-602] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-54237 A client-side enforcement of server-side security vulnerability [CWE-602] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
Fixes

Solution

Please upgrade to FortiSandbox version 5.0.1 or above Please upgrade to FortiSandbox version 4.4.7 or above Please upgrade to FortiSandbox version 4.2.8 or above


Workaround

No workaround given by the vendor.

History

Thu, 24 Jul 2025 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:5.0.0:*:*:*:*:*:*:*

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00036}

epss

{'score': 0.00047}


Tue, 11 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 11 Mar 2025 15:00:00 +0000

Type Values Removed Values Added
Description A client-side enforcement of server-side security vulnerability [CWE-602] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.
Weaknesses CWE-602
References
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:F/RL:X/RC:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-03-11T16:05:31.804Z

Reserved: 2024-11-18T13:36:52.464Z

Link: CVE-2024-52960

cve-icon Vulnrichment

Updated: 2025-03-11T16:02:33.994Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-11T15:15:42.813

Modified: 2025-07-24T18:39:01.057

Link: CVE-2024-52960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:31:04Z