First published: Tue Aug 13 2024(Updated: )
An insufficient session expiration vulnerability [CWE-613] in FortiOS, FortiProxy, FortiPAM & FortiSwitchManager GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=7.2.0<=7.2.5 | |
Fortinet FortiOS | >=7.0 | |
Fortinet FortiOS | >=6.4 | |
Fortinet FortiPAM | >=1.3 | |
Fortinet FortiPAM | >=1.2 | |
Fortinet FortiPAM | >=1.1 | |
Fortinet FortiPAM | >=1.0 | |
Fortinet FortiProxy | >=7.2 | |
Fortinet FortiProxy | >=7.0 | |
Fortinet FortiSwitchManager | >=7.2.0<=7.2.1 | |
Fortinet FortiSwitchManager | >=7.0 | |
Fortinet FortiProxy | >=7.0.0<7.4.0 | |
Fortinet FortiSwitchManager | >=7.0.0<7.2.2 | |
Fortinet FortiOS | >=6.4.0<7.2.6 | |
Fortinet FortiPAM | >=1.0.0<1.4.0 |
Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.6 or above Please upgrade to FortiPAM version 1.4.0 or above Please upgrade to FortiProxy version 7.4.0 or above Please upgrade to FortiSwitchManager version 7.2.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.