An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below, 7.0 all versions, 6.4 all versions; FortiProxy 7.2 all versions, 7.0 all versions; FortiPAM 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions; FortiSwitchManager 7.2.1 and below, 7.0 all versions GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.
According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
Name | Vendor | Start Version | End Version |
---|---|---|---|
Fortiproxy | Fortinet | 7.0.0 (including) | 7.4.0 (excluding) |
Fortiswitchmanager | Fortinet | 7.0.0 (including) | 7.2.2 (excluding) |
Fortios | Fortinet | 6.4.0 (including) | 7.2.6 (excluding) |
Fortipam | Fortinet | 1.0.0 (including) | 1.4.0 (excluding) |