CVE-2024-52961
Published: 11 March 2025
Description
Adversaries may abuse Unix shell commands and scripts for execution.
Security Summary
CVE-2024-52961 is an improper neutralization of special elements used in an OS Command vulnerability (CWE-78) affecting multiple versions of Fortinet FortiSandbox, including version 5.0.0, 4.4.0 through 4.4.6, 4.2.1 through 4.2.7, 4.0.0 through 4.0.5, and all versions of 3.2, 3.1, and 3.0. This flaw allows an authenticated attacker with at least read-only permissions to execute unauthorized commands through crafted requests. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for complete system compromise.
An attacker requires valid credentials with read-only access to the FortiSandbox management interface, which can be exploited remotely over the network with low complexity and no user interaction. Successful exploitation enables arbitrary command execution on the underlying operating system, potentially granting full control over the sandbox appliance, including data exfiltration, persistence, or lateral movement within the environment.
Fortinet has published advisory FG-IR-24-306 at https://fortiguard.fortinet.com/psirt/FG-IR-24-306, which provides details on affected versions and recommended mitigations, including available patches. Security practitioners should consult this advisory for upgrade paths and workarounds.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
OS command injection (CWE-78) in public-facing FortiSandbox management interface directly enables arbitrary Unix shell command execution (T1059.004) and exploitation of public-facing applications (T1190) for initial access or post-auth execution.