Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54018: Execute unauthorized code or commands in Fortinet FortiSandbox

0
Medium
VulnerabilityCVE-2024-54018cvecve-2024-54018
Published: Tue Mar 11 2025 (03/11/2025, 14:54:37 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSandbox

Description

Multiple improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:21:20 UTC

Technical Analysis

CVE-2024-54018 is a command injection vulnerability affecting Fortinet FortiSandbox versions 3.2.0 through 4.4.0. The root cause is improper neutralization of special elements used in OS commands (CWE-78), which allows a privileged attacker to craft malicious requests that execute unauthorized commands on the underlying operating system. This vulnerability requires the attacker to have high-level privileges on the FortiSandbox device, but does not require user interaction, making it a direct threat once access is obtained. The vulnerability impacts confidentiality, integrity, and availability by potentially allowing attackers to execute arbitrary commands, manipulate or exfiltrate data, disrupt sandbox operations, or pivot to other network segments. FortiSandbox is a critical security appliance used for malware analysis and threat detection, so compromise can undermine an organization's security posture. The CVSS 3.1 score of 6.5 reflects medium severity, considering the network attack vector, low attack complexity, and high privileges required. No public exploits have been reported yet, but the vulnerability is published and known to Fortinet. Fortinet has released version 4.4.5 to address this issue, though patch links were not provided in the source data. Organizations using affected versions should prioritize patching and review privileged user access to mitigate risk.

Potential Impact

The impact of CVE-2024-54018 is significant for organizations deploying FortiSandbox as it enables privileged attackers to execute arbitrary OS commands, potentially leading to full compromise of the sandbox environment. This can result in unauthorized data access or exfiltration, disruption of malware analysis processes, and lateral movement within the network. Since FortiSandbox is often integrated into broader security infrastructures, its compromise can weaken overall threat detection capabilities and increase exposure to advanced persistent threats. The requirement for high privileges limits the attack surface to insiders or attackers who have already gained elevated access, but the absence of user interaction and low attack complexity increase the risk once such access is obtained. Organizations relying on FortiSandbox for critical security functions may face operational disruptions and increased risk of data breaches or ransomware propagation if this vulnerability is exploited.

Mitigation Recommendations

1. Upgrade FortiSandbox to version 4.4.5 or later, where this vulnerability is patched. 2. Restrict and monitor privileged user access to FortiSandbox devices, implementing the principle of least privilege and strong authentication mechanisms such as multifactor authentication. 3. Conduct regular audits of administrative accounts and access logs to detect any unauthorized or suspicious activity. 4. Segment FortiSandbox management interfaces from general network access to reduce exposure to potential attackers. 5. Employ network-level protections such as firewalls and intrusion detection/prevention systems to limit access to FortiSandbox management ports. 6. Monitor vendor advisories and threat intelligence feeds for any emerging exploit attempts targeting this vulnerability. 7. Implement robust incident response plans to quickly contain and remediate any detected exploitation attempts. 8. Consider deploying additional endpoint and network security controls to detect anomalous command execution or lateral movement originating from FortiSandbox devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-11-27T15:20:39.890Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6967a2148330e0671671d0f1

Added to database: 1/14/2026, 2:03:00 PM

Last enriched: 2/26/2026, 11:21:20 PM

Last updated: 3/22/2026, 6:08:15 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses