CVE-2024-50562

An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version 7.4.6 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions may allow an attacker in possession of a cookie used to log in the SSL-VPN portal to log in again, although the session has expired or was logged out.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortisase:24.4.60:*:*:*:-:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*

History

25 Jul 2025, 15:25

Type Values Removed Values Added
First Time Fortinet fortios
Fortinet
Fortinet fortisase
References () https://fortiguard.fortinet.com/psirt/FG-IR-24-339 - () https://fortiguard.fortinet.com/psirt/FG-IR-24-339 - Vendor Advisory
CPE cpe:2.3:a:fortinet:fortisase:24.4.60:*:*:*:-:*:*:*
cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

12 Jun 2025, 16:06

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-10 17:19

Updated : 2025-07-25 15:25


NVD link : CVE-2024-50562

Mitre link : CVE-2024-50562

CVE.ORG link : CVE-2024-50562


JSON object : View

Products Affected

fortinet

  • fortios
  • fortisase
CWE
CWE-613

Insufficient Session Expiration