Insufficient Session Expiration in FortiIsolator and FortiSandbox



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-27779
CWE-ID CWE-613
Exploitation vector Network
Public exploit N/A
Vulnerable software
FortiIsolator
Server applications / IDS/IPS systems, Firewalls and proxy servers

FortiSandbox
Server applications / DLP, anti-spam, sniffers

Vendor Fortinet, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Insufficient Session Expiration

EUVDB-ID: #VU112471

Risk: Low

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-27779

CWE-ID: CWE-613 - Insufficient Session Expiration

Exploit availability: No

Description

The vulnerability allows a remote privileged user to compromise the affected system.

The vulnerability exists due to insufficient session expiration. A remote attacker in possession of an admin session cookie can keep using that admin's session even after the admin user was deleted.

Mitigation

Install update from vendor's website.

Vulnerable software versions

FortiIsolator: 1.2.0 - 2.4.4

FortiSandbox: 3.2.0 - 4.4.4

CPE2.3 External links

https://www.fortiguard.com/psirt/FG-IR-24-035


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###