CVE-2020-6649

An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:fortiisolator:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
References () https://fortiguard.com/advisory/FG-IR-20-011 - Vendor Advisory () https://fortiguard.com/advisory/FG-IR-20-011 - Vendor Advisory

Information

Published : 2021-02-08 16:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-6649

Mitre link : CVE-2020-6649

CVE.ORG link : CVE-2020-6649


JSON object : View

Products Affected

fortinet

  • fortiisolator
CWE
CWE-613

Insufficient Session Expiration