An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version 7.4.6 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions may allow an attacker in possession of a cookie used to log in the SSL-VPN portal to log in again, although the session has expired or was logged out.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-339 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Jul 2025, 15:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fortinet fortios
Fortinet Fortinet fortisase |
|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-339 - Vendor Advisory | |
CPE | cpe:2.3:a:fortinet:fortisase:24.4.60:*:*:*:-:*:*:* cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
12 Jun 2025, 16:06
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-10 17:19
Updated : 2025-07-25 15:25
NVD link : CVE-2024-50562
Mitre link : CVE-2024-50562
CVE.ORG link : CVE-2024-50562
JSON object : View
Products Affected
fortinet
- fortios
- fortisase
CWE
CWE-613
Insufficient Session Expiration