First published: Tue Jul 11 2023(Updated: )
An insufficient session expiration [CWE-613] vulnerability in FortiOS REST API may allow an attacker to keep a secure websocket session active after user deletion.## Workaround:Restrict hosts that can connect to the websocket to trusted ones only, with the trusted host feature.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.4 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-028 is considered high due to the risk of maintaining active sessions after user deletion.
To fix FG-IR-23-028, upgrade FortiOS to version 7.2.5 or above for the affected versions.
FG-IR-23-028 is caused by an insufficient session expiration mechanism in the FortiOS REST API.
Users with FortiOS versions 7.2.0 to 7.2.4 and 7.0.0 to 7.0.12 are affected by FG-IR-23-028.
The recommended workaround for FG-IR-23-028 is to restrict websocket connections to only trusted hosts.