An insufficient session expiration vulnerability [CWE-613] and an incorrect authorization vulnerability [CWE-863] in FortiIsolator 2.4.0 through 2.4.4, 2.3 all versions, 2.2.0, 2.1 all versions, 2.0 all versions authentication mechanism may allow remote unauthenticated attacker to deauthenticate logged in admins via crafted cookie and remote authenticated read-only attacker to gain write privilege via crafted cookie.
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-24-062 | Vendor Advisory |
Configurations
History
15 Oct 2025, 17:38
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-062 - Vendor Advisory | |
| First Time |
Fortinet fortiisolator
Fortinet |
|
| CPE | cpe:2.3:a:fortinet:fortiisolator:*:*:*:*:*:*:*:* |
14 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-14 16:15
Updated : 2025-10-15 17:38
NVD link : CVE-2024-33507
Mitre link : CVE-2024-33507
CVE.ORG link : CVE-2024-33507
JSON object : View
Products Affected
fortinet
- fortiisolator
CWE
CWE-613
Insufficient Session Expiration
