CVE-2024-54027

8.2 HIGH

📋 TL;DR

This vulnerability allows a privileged attacker with super-admin profile and CLI access to read sensitive data via hard-coded cryptographic keys in FortiSandbox. It affects multiple versions of FortiSandbox across different release branches. The attacker must already have administrative CLI access to exploit this vulnerability.

💻 Affected Systems

Products:
  • FortiSandbox
Versions: 4.4.6 and below, 4.2.7 and below, 4.0.5 and below, 3.2.4 and below, 3.1.5 and below, 3.0.7 to 3.0.5
Operating Systems: Fortinet's custom OS for FortiSandbox
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions are vulnerable by default. The attacker must have super-admin profile and CLI access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious insider or compromised administrator could decrypt sensitive data stored or transmitted by FortiSandbox, potentially exposing confidential information, credentials, or security configurations.

🟠

Likely Case

An attacker with legitimate administrative access could abuse their privileges to access sensitive data they shouldn't normally be able to view, violating the principle of least privilege.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to authorized administrators who follow security policies and procedures.

🌐 Internet-Facing: LOW - This requires CLI access with super-admin privileges, which should not be exposed to the internet.
🏢 Internal Only: MEDIUM - While it requires privileged access, insider threats or compromised admin accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires existing administrative CLI access. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Fortinet advisory for specific patched versions

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-327

Restart Required: No

Instructions:

1. Review Fortinet advisory FG-IR-24-327. 2. Upgrade to patched versions as specified by Fortinet. 3. Verify the update was successful.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to only necessary administrators and implement strict access controls

Implement Monitoring

all

Monitor CLI access logs for unusual activity or unauthorized access attempts

🧯 If You Can't Patch

  • Implement strict role-based access control (RBAC) to limit who has super-admin privileges
  • Enable detailed logging and monitoring of all CLI access and review logs regularly

🔍 How to Verify

Check if Vulnerable:

Check FortiSandbox version via CLI: 'get system status' and compare against affected versions list

Check Version:

get system status

Verify Fix Applied:

After patching, verify version is no longer in affected range and test that sensitive data access controls are functioning properly

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI access patterns
  • Multiple failed CLI authentication attempts followed by success
  • Access to sensitive data files or commands

Network Indicators:

  • Unusual SSH or CLI connections to FortiSandbox management interfaces

SIEM Query:

source="fortisandbox" AND (event_type="cli_access" OR event_type="authentication") AND (user="super-admin" OR privilege_level="admin")

🔗 References

📤 Share & Export