First published: Tue Sep 07 2021(Updated: )
An insufficient session expiration vulnerability [CWE-613] in FortiSandbox may allow an attacker to reuse the unexpired admin user session IDs to gain information about other users configured on the device, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-20-070 is categorized as significant due to the potential for unauthorized access.
To fix FG-IR-20-070, ensure proper session management configurations are implemented to enforce session expiration.
FortiSandbox users with configurations allowing admin user session IDs can be affected by FG-IR-20-070.
FG-IR-20-070 allows attackers to reuse unexpired admin session IDs, potentially gaining unauthorized access to user information.
FG-IR-20-070 was disclosed in a security advisory by FortiGuard.