Vulnerability Details CVE-2020-15939
An improper access control vulnerability (CWE-284) in FortiSandbox versions 3.2.1 and below and 3.1.4 and below may allow an authenticated, unprivileged attacker to download the device configuration file via the recovery URL.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 45.5%
CVSS Severity
CVSS v3 Score 4.3
CVSS v2 Score 4.0
Products affected by CVE-2020-15939
-
cpe:2.3:a:fortinet:fortisandbox:-
-
cpe:2.3:a:fortinet:fortisandbox:1.2.0
-
cpe:2.3:a:fortinet:fortisandbox:1.2.3
-
cpe:2.3:a:fortinet:fortisandbox:1.3.0
-
cpe:2.3:a:fortinet:fortisandbox:1.4.0
-
cpe:2.3:a:fortinet:fortisandbox:1.4.1
-
cpe:2.3:a:fortinet:fortisandbox:1.4.2
-
cpe:2.3:a:fortinet:fortisandbox:2.0.0
-
cpe:2.3:a:fortinet:fortisandbox:2.0.2
-
cpe:2.3:a:fortinet:fortisandbox:2.0.3
-
cpe:2.3:a:fortinet:fortisandbox:2.1.0
-
cpe:2.3:a:fortinet:fortisandbox:2.1.1
-
cpe:2.3:a:fortinet:fortisandbox:2.1.2
-
cpe:2.3:a:fortinet:fortisandbox:2.1.3
-
cpe:2.3:a:fortinet:fortisandbox:2.2.0
-
cpe:2.3:a:fortinet:fortisandbox:2.2.1
-
cpe:2.3:a:fortinet:fortisandbox:2.2.2
-
cpe:2.3:a:fortinet:fortisandbox:2.3.0
-
cpe:2.3:a:fortinet:fortisandbox:2.3.2
-
cpe:2.3:a:fortinet:fortisandbox:2.3.3
-
cpe:2.3:a:fortinet:fortisandbox:2.4.0
-
cpe:2.3:a:fortinet:fortisandbox:2.4.1
-
cpe:2.3:a:fortinet:fortisandbox:2.5.0
-
cpe:2.3:a:fortinet:fortisandbox:2.5.1
-
cpe:2.3:a:fortinet:fortisandbox:2.5.2
-
cpe:2.3:a:fortinet:fortisandbox:3.0.0
-
cpe:2.3:a:fortinet:fortisandbox:3.0.1
-
cpe:2.3:a:fortinet:fortisandbox:3.0.2
-
cpe:2.3:a:fortinet:fortisandbox:3.0.3
-
cpe:2.3:a:fortinet:fortisandbox:3.0.4
-
cpe:2.3:a:fortinet:fortisandbox:3.0.5
-
cpe:2.3:a:fortinet:fortisandbox:3.0.6
-
cpe:2.3:a:fortinet:fortisandbox:3.0.7
-
cpe:2.3:a:fortinet:fortisandbox:3.1.0
-
cpe:2.3:a:fortinet:fortisandbox:3.1.1
-
cpe:2.3:a:fortinet:fortisandbox:3.1.2
-
cpe:2.3:a:fortinet:fortisandbox:3.1.3
-
cpe:2.3:a:fortinet:fortisandbox:3.1.4
-
cpe:2.3:a:fortinet:fortisandbox:3.2.0
-
cpe:2.3:a:fortinet:fortisandbox:3.2.1