{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-54026","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2024-11-27T15:20:39.891Z","datePublished":"2025-03-11T14:54:38.660Z","dateUpdated":"2026-01-14T14:16:03.420Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiSandbox","cpes":["cpe:2.3:a:fortinet:fortisandbox:4.4.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.8:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.2.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.1.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisandbox:3.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"4.4.0","lessThanOrEqual":"4.4.6","status":"affected"},{"versionType":"semver","version":"4.2.1","lessThanOrEqual":"4.2.8","status":"affected"},{"versionType":"semver","version":"4.0.0","lessThanOrEqual":"4.0.6","status":"affected"},{"versionType":"semver","version":"3.2.0","lessThanOrEqual":"3.2.4","status":"affected"},{"versionType":"semver","version":"3.1.0","lessThanOrEqual":"3.1.5","status":"affected"},{"versionType":"semver","version":"3.0.0","lessThanOrEqual":"3.0.7","status":"affected"}]},{"vendor":"Fortinet","product":"FortiSandbox Cloud","cpes":["cpe:2.3:a:fortinet:fortisandboxcloud:24.1:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"24.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiSandbox 4.4.0 through 4.4.6, FortiSandbox 4.2 all versions, FortiSandbox 4.0 all versions, FortiSandbox 3.2 all versions, FortiSandbox 3.1 all versions, FortiSandbox 3.0 all versions, FortiSandbox Cloud 24.1 allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2026-01-14T14:16:03.420Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-89","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:C"}}],"solutions":[{"lang":"en","value":"Upgrade to FortiSandbox version 5.0.1 or above\nUpgrade to FortiSandbox version 4.4.7 or above\nFortinet remediated this issue in FortiSandbox Cloud version 24.2 (not released) and hence customers do not need to perform any action."}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-24-353","url":"https://fortiguard.fortinet.com/psirt/FG-IR-24-353"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-11T16:02:30.152318Z","id":"CVE-2024-54026","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-11T16:05:02.790Z"}}]}}