轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202604-00000012
[內容說明]
Fortinet發布FortiSandbox JRPC API 存在重大資安漏洞(CVE-2026-39813,CVSS:9.8),此為路徑遍歷漏洞,可能允許未經過身分驗證的攻擊者,透過特製的HTTP請求繞過身分驗證。
[影響平台]
FortiSandbox 4.4.0 至 4.4.8 (含)版本
FortiSandbox 5.0.0 至 5.0.5 (含)版本
[建議措施]
請更新至以下版本
FortiSandbox 4.4.9 (含)之後版本、 FortiSandbox 5.0.6 (含)之後版本
[參考資料]
1. https://www.twcert.org.tw/tw/cp-169-10838-99d85-1.html
Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202604-00000012
[Content Description]
Fortinet has released a critical cybersecurity vulnerability (CVE-2026-39813, CVSS: 9.8) in its FortiSandbox JRPC API. This is a path traversal vulnerability that could allow unauthenticated attackers to bypass authentication through specially crafted HTTP requests.
[Affected Platforms]
FortiSandbox versions 4.4.0 to 4.4.8 (inclusive)
FortiSandbox versions 5.0.0 to 5.0.5 (inclusive)
[Recommended Actions]
Please update to the following versions:
FortiSandbox version 4.4.9 (inclusive) and later, FortiSandbox version 5.0.6 (inclusive) and later
[References]
1. https://www.twcert.org.tw/tw/cp-169-10838-99d85-1.html