An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-20-072 | Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-20-072 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 8.1 |
References | () https://fortiguard.com/advisory/FG-IR-20-072 - Vendor Advisory |
Information
Published : 2021-10-06 10:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24019
Mitre link : CVE-2021-24019
CVE.ORG link : CVE-2021-24019
JSON object : View
Products Affected
fortinet
- forticlient_endpoint_management_server
CWE
CWE-613
Insufficient Session Expiration