A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests.
History

Mon, 31 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 24 Mar 2025 15:45:00 +0000

Type Values Removed Values Added
Description A stack-based buffer overflow vulnerability (CWE-121) in the profile parser of FortiSandbox version 3.2.2 and below, version 3.1.4 and below may allow an authenticated attacker to potentially execute unauthorized code or commands via specifically crafted HTTP requests.
Weaknesses CWE-358
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:X/RC:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-03-31T18:19:39.502Z

Reserved: 2021-01-25T14:47:15.095Z

Link: CVE-2021-26105

cve-icon Vulnrichment

Updated: 2025-03-31T18:19:35.535Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-24T16:15:16.610

Modified: 2025-03-27T16:44:44.143

Link: CVE-2021-26105

cve-icon Redhat

No data.