{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-31491","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2024-04-04T12:52:41.586Z","datePublished":"2024-05-14T16:19:02.974Z","dateUpdated":"2026-01-14T14:16:00.825Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiSandbox","cpes":["cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"4.4.0","lessThanOrEqual":"4.4.4","status":"affected"},{"versionType":"semver","version":"4.2.1","lessThanOrEqual":"4.2.6","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A client-side enforcement of server-side security vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.4, FortiSandbox 4.2.1 through 4.2.6 allows attacker to execute unauthorized code or commands via HTTP requests."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2026-01-14T14:16:00.825Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-602","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X"}}],"solutions":[{"lang":"en","value":"Fortinet remediated this issue in FortiSandbox Cloud version 24.1 and hence customers do not need to perform any action.\nUpgrade to FortiSandbox version 4.4.5 or above\nUpgrade to FortiSandbox version 4.2.7 or above"}],"references":[{"name":"https://fortiguard.com/psirt/FG-IR-24-054","url":"https://fortiguard.com/psirt/FG-IR-24-054"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T01:52:57.116Z"},"title":"CVE Program Container","references":[{"name":"https://fortiguard.com/psirt/FG-IR-24-054","url":"https://fortiguard.com/psirt/FG-IR-24-054","tags":["x_transferred"]}]},{"affected":[{"vendor":"fortinet","product":"fortisandbox","cpes":["cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"4.4.0","status":"affected","lessThanOrEqual":"4.4.4","versionType":"semver"},{"version":"4.2.0","status":"affected","lessThanOrEqual":"4.2.6","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-05-16T18:57:33.724991Z","id":"CVE-2024-31491","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-26T18:50:05.200Z"}}]}}