Vulnerability Details CVE-2020-29013
An improper input validation vulnerability in the sniffer interface of FortiSandbox before 3.2.2 may allow an authenticated attacker to silently halt the sniffer via specifically crafted requests.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 59.8%
CVSS Severity
CVSS v3 Score 5.4
CVSS v2 Score 5.5
Products affected by CVE-2020-29013
-
cpe:2.3:a:fortinet:fortisandbox:-
-
cpe:2.3:a:fortinet:fortisandbox:1.2.0
-
cpe:2.3:a:fortinet:fortisandbox:1.2.3
-
cpe:2.3:a:fortinet:fortisandbox:1.3.0
-
cpe:2.3:a:fortinet:fortisandbox:1.4.0
-
cpe:2.3:a:fortinet:fortisandbox:1.4.1
-
cpe:2.3:a:fortinet:fortisandbox:1.4.2
-
cpe:2.3:a:fortinet:fortisandbox:2.0.0
-
cpe:2.3:a:fortinet:fortisandbox:2.0.2
-
cpe:2.3:a:fortinet:fortisandbox:2.0.3
-
cpe:2.3:a:fortinet:fortisandbox:2.1.0
-
cpe:2.3:a:fortinet:fortisandbox:2.1.1
-
cpe:2.3:a:fortinet:fortisandbox:2.1.2
-
cpe:2.3:a:fortinet:fortisandbox:2.1.3
-
cpe:2.3:a:fortinet:fortisandbox:2.2.0
-
cpe:2.3:a:fortinet:fortisandbox:2.2.1
-
cpe:2.3:a:fortinet:fortisandbox:2.2.2
-
cpe:2.3:a:fortinet:fortisandbox:2.3.0
-
cpe:2.3:a:fortinet:fortisandbox:2.3.2
-
cpe:2.3:a:fortinet:fortisandbox:2.3.3
-
cpe:2.3:a:fortinet:fortisandbox:2.4.0
-
cpe:2.3:a:fortinet:fortisandbox:2.4.1
-
cpe:2.3:a:fortinet:fortisandbox:2.5.0
-
cpe:2.3:a:fortinet:fortisandbox:2.5.1
-
cpe:2.3:a:fortinet:fortisandbox:2.5.2
-
cpe:2.3:a:fortinet:fortisandbox:3.0.0
-
cpe:2.3:a:fortinet:fortisandbox:3.0.1
-
cpe:2.3:a:fortinet:fortisandbox:3.0.2
-
cpe:2.3:a:fortinet:fortisandbox:3.0.3
-
cpe:2.3:a:fortinet:fortisandbox:3.0.4
-
cpe:2.3:a:fortinet:fortisandbox:3.0.5
-
cpe:2.3:a:fortinet:fortisandbox:3.0.6
-
cpe:2.3:a:fortinet:fortisandbox:3.0.7
-
cpe:2.3:a:fortinet:fortisandbox:3.1.0
-
cpe:2.3:a:fortinet:fortisandbox:3.1.1
-
cpe:2.3:a:fortinet:fortisandbox:3.1.2
-
cpe:2.3:a:fortinet:fortisandbox:3.1.3
-
cpe:2.3:a:fortinet:fortisandbox:3.1.4
-
cpe:2.3:a:fortinet:fortisandbox:3.2.0
-
cpe:2.3:a:fortinet:fortisandbox:3.2.1