Cyber Posture

CVE-2021-26105

Medium

Published: 24 March 2025

Published
24 March 2025
Modified
24 July 2025
KEV Added
Patch
CVSS Score 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0036 57.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2021-26105 is a stack-based buffer overflow vulnerability (CWE-121) affecting the profile parser in FortiSandbox versions 3.2.2 and below, as well as versions 3.1.4 and below. Additional associated weakness enumerations include CWE-358 and CWE-787. The vulnerability, published on 2025-03-24, carries a CVSS v3.1 base score of 6.8 (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H) and can be triggered via specifically crafted HTTP requests.

An authenticated attacker with low privileges (PR:L) can exploit this issue remotely over the network (AV:N), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful exploitation may allow the attacker to execute unauthorized code or commands, potentially compromising system integrity (I:H) and availability (A:H) without impacting confidentiality (C:N).

Mitigation details are available in the Fortinet PSIRT advisory at https://fortiguard.fortinet.com/psirt/FG-IR-20-234.

Details

CWE(s)
CWE-358CWE-787

Affected Products

fortinet
fortisandbox
4.0.0 · 3.1.0 — 3.1.4 · 3.2.0 — 3.2.3

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Stack-based buffer overflow in profile parser allows authenticated low-privilege remote attacker to trigger arbitrary code/command execution via crafted HTTP requests, directly enabling privilege escalation through software vulnerability exploitation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References