First published: Tue Nov 12 2024(Updated: )
A session fixation vulnerability [CWE-384] in FortiOS may allow an unauthenticated attacker to hijack user session via a phishing SAML authentication link.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.7 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-23-475 vulnerability is considered critical due to its potential for session hijacking by unauthenticated attackers.
To remediate FG-IR-23-475, upgrade your FortiOS to version 7.4.4 or later, or to version 7.2.8 or later, or to version 7.0.14 or later.
The FG-IR-23-475 vulnerability impacts FortiOS versions 7.4.0 to 7.4.3, 7.2.0 to 7.2.7, and 7.0.0 to 7.0.13.
Session fixation in FG-IR-23-475 allows attackers to hijack an authenticated session using a manipulated SAML authentication link.
The FG-IR-23-475 vulnerability can enable session hijacking attacks, where an attacker gains unauthorized access to a user's session.