{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-41682","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2023-08-30T13:42:39.547Z","datePublished":"2023-10-13T14:51:03.342Z","dateUpdated":"2026-01-14T13:46:51.202Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiSandbox","cpes":["cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:2.5.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:2.5.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:2.5.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:2.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:2.4.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"4.4.0","status":"affected"},{"versionType":"semver","version":"4.2.1","lessThanOrEqual":"4.2.5","status":"affected"},{"versionType":"semver","version":"4.0.0","lessThanOrEqual":"4.0.3","status":"affected"},{"versionType":"semver","version":"3.2.0","lessThanOrEqual":"3.2.4","status":"affected"},{"versionType":"semver","version":"3.1.0","lessThanOrEqual":"3.1.5","status":"affected"},{"versionType":"semver","version":"3.0.0","lessThanOrEqual":"3.0.7","status":"affected"},{"versionType":"semver","version":"2.5.0","lessThanOrEqual":"2.5.2","status":"affected"},{"versionType":"semver","version":"2.4.0","lessThanOrEqual":"2.4.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiSandbox 4.4.0, FortiSandbox 4.2.1 through 4.2.5, FortiSandbox 4.0.0 through 4.0.3, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions, FortiSandbox 2.5 all versions, FortiSandbox 2.4 all versions allows attacker to denial of service via crafted http requests."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2026-01-14T13:46:51.202Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-22","description":"Denial of service","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.9,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:F/RL:X/RC:C"}}],"solutions":[{"lang":"en","value":"Fortinet remediated this issue in FortiSandbox Cloud version 24.1 and hence customers do not need to perform any action.\nUpgrade to FortiSandbox version 4.4.2 or above\nUpgrade to FortiSandbox version 4.2.6 or above\nUpgrade to FortiSandbox version 4.0.4 or above"}],"references":[{"name":"https://fortiguard.com/psirt/FG-IR-23-280","url":"https://fortiguard.com/psirt/FG-IR-23-280"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:01:35.465Z"},"title":"CVE Program Container","references":[{"name":"https://fortiguard.com/psirt/FG-IR-23-280","url":"https://fortiguard.com/psirt/FG-IR-23-280","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-16T20:42:11.608213Z","id":"CVE-2023-41682","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-16T20:42:19.766Z"}}]}}