CVE Vulnerabilities

CVE-2022-45862

Insufficient Session Expiration

Published: Aug 13, 2024 | Modified: Aug 22, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below, 7.0 all versions, 6.4 all versions; FortiProxy 7.2 all versions, 7.0 all versions; FortiPAM 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions; FortiSwitchManager 7.2.1 and below, 7.0 all versions GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Fortiproxy Fortinet 7.0.0 (including) 7.4.0 (excluding)
Fortiswitchmanager Fortinet 7.0.0 (including) 7.2.2 (excluding)
Fortios Fortinet 6.4.0 (including) 7.2.6 (excluding)
Fortipam Fortinet 1.0.0 (including) 1.4.0 (excluding)

Potential Mitigations

References