An insufficient session expiration in Fortinet FortiOS 7.0.0 - 7.0.12 and 7.2.0 - 7.2.4 allows an attacker to execute unauthorized code or commands via reusing the session of a deleted user in the REST API.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-028 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-23-028 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-23-028 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.1 |
18 Jul 2023, 20:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fortinet fortios
Fortinet |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | |
References | (MISC) https://fortiguard.com/psirt/FG-IR-23-028 - Vendor Advisory | |
CWE | CWE-613 |
11 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-11 17:15
Updated : 2024-11-21 07:53
NVD link : CVE-2023-28001
Mitre link : CVE-2023-28001
CVE.ORG link : CVE-2023-28001
JSON object : View
Products Affected
fortinet
- fortios
CWE
CWE-613
Insufficient Session Expiration