CVE-2021-26105
Published: 24 March 2025
Description
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Security Summary
CVE-2021-26105 is a stack-based buffer overflow vulnerability (CWE-121) affecting the profile parser in FortiSandbox versions 3.2.2 and below, as well as versions 3.1.4 and below. Additional associated weakness enumerations include CWE-358 and CWE-787. The vulnerability, published on 2025-03-24, carries a CVSS v3.1 base score of 6.8 (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H) and can be triggered via specifically crafted HTTP requests.
An authenticated attacker with low privileges (PR:L) can exploit this issue remotely over the network (AV:N), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation may allow the attacker to execute unauthorized code or commands, potentially compromising system integrity (I:H) and availability (A:H) without impacting confidentiality (C:N).
Mitigation details are available in the Fortinet PSIRT advisory at https://fortiguard.fortinet.com/psirt/FG-IR-20-234.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Stack-based buffer overflow in profile parser allows authenticated low-privilege remote attacker to trigger arbitrary code/command execution via crafted HTTP requests, directly enabling privilege escalation through software vulnerability exploitation.