CVE-2022-45862

An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below, 7.0 all versions, 6.4 all versions; FortiProxy 7.2 all versions, 7.0 all versions; FortiPAM 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions; FortiSwitchManager 7.2.1 and below, 7.0 all versions GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-22-445 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-08-13 16:15

Updated : 2024-08-22 14:32


NVD link : CVE-2022-45862

Mitre link : CVE-2022-45862

CVE.ORG link : CVE-2022-45862


JSON object : View

Products Affected

fortinet

  • fortiswitchmanager
  • fortiproxy
  • fortipam
  • fortios
CWE
CWE-613

Insufficient Session Expiration