First published: Wed Oct 06 2021(Updated: )
An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient Endpoint Management Server | <6.2.9 | |
Fortinet Forticlient Endpoint Management Server | >=6.4.0<6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-24019.
CVE-2021-24019 has a severity rating of 9.8 (critical).
FortiClientEMS versions 6.4.2 and below, 6.2.9 and below are affected by CVE-2021-24019.
The CWE ID for this vulnerability is CWE-613.
An attacker can exploit CVE-2021-24019 by reusing unexpired admin user session IDs to gain admin privileges.