First published: Mon Jun 22 2020(Updated: )
An insufficient session expiration vulnerability in FortiDeceptor 3.0.0 and below allows an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID via other, hypothetical attacks.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiDeceptor | <=3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6644 is an insufficient session expiration vulnerability in FortiDeceptor 3.0.0 and below.
CVE-2020-6644 allows an attacker to reuse unexpired admin user session IDs to gain admin privileges.
The severity of CVE-2020-6644 is high, with a CVSS score of 8.1.
An attacker can exploit CVE-2020-6644 by obtaining an unexpired admin user session ID through other hypothetical attacks.
It is recommended to upgrade FortiDeceptor to version 3.0.1 or above to fix CVE-2020-6644.