Cyber Posture

CVE-2024-45328

High

Published: 11 March 2025

Published
11 March 2025
Modified
24 July 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 24.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-45328 is a high-severity Incorrect Authorization (CWE-863) vulnerability in Fortinet Fortisandbox. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 24.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-24 (Access Control Decisions) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces approved authorizations for access to system resources like elevated CLI commands, mitigating the incorrect authorization vulnerability.

prevent

Applies least privilege to restrict low-privileged administrators from executing elevated CLI commands via the GUI.

prevent

Ensures correct access control decisions for system resources, preventing low-privileged users from bypassing authorization to run elevated CLI commands.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The incorrect authorization vulnerability directly allows low-privileged users to execute elevated CLI commands, enabling privilege escalation via exploitation of the software flaw.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu.

Deeper analysisAI

CVE-2024-45328 is an incorrect authorization vulnerability (CWE-863) affecting FortiSandbox versions 4.4.0 through 4.4.6. The issue enables a low-privileged administrator to execute elevated CLI commands via the GUI console menu, bypassing intended access controls.

A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation requires local access (AV:L) to the system but can result in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), as reflected in its CVSS v3.1 base score of 7.8 with unchanged scope (S:U). This could allow the attacker to escalate privileges and gain full control over the affected FortiSandbox instance.

The Fortinet PSIRT advisory (FG-IR-24-261) provides details on mitigation and patches; security practitioners should consult https://fortiguard.fortinet.com/psirt/FG-IR-24-261 for remediation guidance.

Details

CWE(s)

Affected Products

fortinet
fortisandbox
4.4.0 — 4.4.7

CVEs Like This One

CVE-2026-39813Same product: Fortinet Fortisandbox
CVE-2021-26105Same product: Fortinet Fortisandbox
CVE-2024-54027Same product: Fortinet Fortisandbox
CVE-2024-27778Same product: Fortinet Fortisandbox
CVE-2024-54018Same product: Fortinet Fortisandbox
CVE-2026-39808Same product: Fortinet Fortisandbox
CVE-2025-53949Same product: Fortinet Fortisandbox
CVE-2024-52960Same product: Fortinet Fortisandbox
CVE-2024-27781Same product: Fortinet Fortisandbox
CVE-2025-52436Same product: Fortinet Fortisandbox

References