CVE-2020-6649

An insufficient session expiration vulnerability in FortiNet's FortiIsolator version 2.0.1 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
References
Link Resource
https://fortiguard.com/advisory/FG-IR-20-011 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:fortiisolator:*:*:*:*:*:*:*:*

History

10 Feb 2021, 19:02

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
References (CONFIRM) https://fortiguard.com/advisory/FG-IR-20-011 - (CONFIRM) https://fortiguard.com/advisory/FG-IR-20-011 - Vendor Advisory
CPE cpe:2.3:a:fortinet:fortiisolator:*:*:*:*:*:*:*:*
CWE CWE-613

08 Feb 2021, 16:20

Type Values Removed Values Added
New CVE

Information

Published : 2021-02-08 16:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-6649

Mitre link : CVE-2020-6649

CVE.ORG link : CVE-2020-6649


JSON object : View

Products Affected

fortinet

  • fortiisolator
CWE
CWE-613

Insufficient Session Expiration