CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
51.9%
A use of password hash with insufficient computational effort vulnerability [CWE-916] in FortiSandbox before 4.2.0 may allow an attacker with access to theΒ password database to efficiently mount bulk guessing attacks to recover the passwords.
Vendor | Product | Version | CPE |
---|---|---|---|
fortinet | fortisandbox | 3.2.0 | cpe:2.3:a:fortinet:fortisandbox:3.2.0:*:*:*:*:*:*:* |
fortinet | fortisandbox | 3.2.1 | cpe:2.3:a:fortinet:fortisandbox:3.2.1:*:*:*:*:*:*:* |
fortinet | fortisandbox | 3.2.2 | cpe:2.3:a:fortinet:fortisandbox:3.2.2:*:*:*:*:*:*:* |
fortinet | fortisandbox | 3.2.3 | cpe:2.3:a:fortinet:fortisandbox:3.2.3:*:*:*:*:*:*:* |
fortinet | fortisandbox | 4.0.0 | cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:* |
fortinet | fortisandbox | 4.0.1 | cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:* |
fortinet | fortisandbox | 4.0.2 | cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:* |
[
{
"vendor": "Fortinet",
"product": "FortiSandbox",
"defaultStatus": "unaffected",
"versions": [
{
"versionType": "semver",
"version": "4.0.0",
"lessThanOrEqual": "4.0.2",
"status": "affected"
},
{
"versionType": "semver",
"version": "3.2.0",
"lessThanOrEqual": "3.2.3",
"status": "affected"
}
]
}
]