First published: Tue Sep 07 2021(Updated: )
An insufficient session expiration vulnerability [CWE-613] in FortiSandbox may allow an attacker to reuse the unexpired admin user session IDs to gain information about other users configured on the device, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | <3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-29012.
The severity rating of CVE-2020-29012 is medium (5.3).
FortiSandbox versions 3.2.1 and below are affected.
The vulnerability allows an attacker to reuse unexpired admin user session IDs, which can be used to gain information about other users configured on the device.
Yes, upgrading to FortiSandbox version 3.2.2 or later will fix the vulnerability.