First published: Mon Feb 08 2021(Updated: )
An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiIsolator | <=2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6649 is an insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below.
CVE-2020-6649 allows an attacker to reuse unexpired admin user session IDs to gain admin privileges, if they obtain the session ID through other attacks.
CVE-2020-6649 has a severity rating of 9.8, which is classified as critical.
To fix CVE-2020-6649, it is recommended to upgrade FortiNet's FortiIsolator to a version above 2.0.1.
More information about CVE-2020-6649 can be found on the FortiGuard advisory page at https://fortiguard.com/advisory/FG-IR-20-011.