First published: Tue Aug 13 2024(Updated: )
An insufficient session expiration vulnerability [CWE-613] in FortiOS, FortiProxy, FortiPAM & FortiSwitchManager GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=7.2.0<=7.2.5 | |
Fortinet FortiOS | >=7.0 | |
Fortinet FortiOS | >=6.4 | |
Fortinet FortiPAM | >=1.3 | |
Fortinet FortiPAM | >=1.2 | |
Fortinet FortiPAM | >=1.1 | |
Fortinet FortiPAM | >=1.0 | |
Fortinet FortiProxy | >=7.2 | |
Fortinet FortiProxy | >=7.0 | |
Fortinet FortiSwitchManager | >=7.2.0<=7.2.1 | |
Fortinet FortiSwitchManager | >=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.