Cyber Posture

CVE-2024-54018

High

Published: 11 March 2025

Published
11 March 2025
Modified
23 July 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0225 84.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2024-54018 consists of multiple improper neutralization of special elements used in an OS command vulnerabilities (CWE-78) in FortiSandbox versions before 4.4.5. These flaws allow a privileged attacker to execute unauthorized commands via crafted requests, stemming from inadequate sanitization of inputs that are passed to underlying operating system commands.

The vulnerability has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network with low attack complexity, but requires high privileges. A suitably privileged attacker, such as an administrator with access to the system, can craft malicious requests to inject and execute arbitrary OS commands, potentially achieving high impacts on confidentiality, integrity, and availability, including full system compromise.

Fortinet's PSIRT advisory (FG-IR-24-110) details the vulnerabilities and recommends upgrading to FortiSandbox 4.4.5 or later to mitigate the issues, as all prior versions are affected.

Details

CWE(s)
CWE-78

Affected Products

fortinet
fortisandbox
3.2.0 — 4.4.6

MITRE ATT&CK Enterprise Techniques

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The CVE describes OS command injection (CWE-78) allowing a privileged attacker to execute arbitrary commands via crafted requests due to unsanitized inputs passed to the OS, directly enabling Unix Shell execution on the Linux-based FortiSandbox appliance.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References