First published: Tue Aug 13 2024(Updated: )
An insufficient session expiration vulnerability [CWE-613] in FortiOS, FortiProxy, FortiPAM & FortiSwitchManager GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.5 | |
Fortinet FortiOS IPS Engine | >=7.0 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
FortiGuard FortiPAM | >=1.3 | |
FortiGuard FortiPAM | >=1.2 | |
FortiGuard FortiPAM | >=1.1 | |
FortiGuard FortiPAM | >=1.0 | |
Fortinet FortiProxy | >=7.2 | |
Fortinet FortiProxy | >=7.0 | |
Fortinet FortiSwitchManager | >=7.2.0<=7.2.1 | |
Fortinet FortiSwitchManager | >=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-22-445 vulnerability is classified as having an insufficient session expiration severity level.
To address FG-IR-22-445, upgrade your FortiOS, FortiProxy, FortiPAM, or FortiSwitchManager to the latest patched version as specified in the advisory.
FG-IR-22-445 affects FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager, particularly versions prior to their respective patched releases.
Yes, FG-IR-22-445 can be exploited remotely if an attacker obtains the required credentials.
FG-IR-22-445 is an insufficient session expiration vulnerability, specifically identified as CWE-613.