GUI Console WebSockets do not terminate on logout
Summary
An insufficient session expiration vulnerability [CWE-613] in FortiOS, FortiProxy, FortiPAM & FortiSwitchManager GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.
Version | Affected | Solution |
---|---|---|
FortiOS 7.4 | Not affected | Not Applicable |
FortiOS 7.2 | 7.2.0 through 7.2.5 | Upgrade to 7.2.6 or above |
FortiOS 7.0 | 7.0 all versions | Migrate to a fixed release |
FortiOS 6.4 | 6.4 all versions | Migrate to a fixed release |
FortiPAM 1.4 | Not affected | Not Applicable |
FortiPAM 1.3 | 1.3 all versions | Migrate to a fixed release |
FortiPAM 1.2 | 1.2 all versions | Migrate to a fixed release |
FortiPAM 1.1 | 1.1 all versions | Migrate to a fixed release |
FortiPAM 1.0 | 1.0 all versions | Migrate to a fixed release |
FortiProxy 7.4 | Not affected | Not Applicable |
FortiProxy 7.2 | 7.2 all versions | Migrate to a fixed release |
FortiProxy 7.0 | 7.0 all versions | Migrate to a fixed release |
FortiSwitchManager 7.2 | 7.2.0 through 7.2.1 | Upgrade to 7.2.2 or above |
FortiSwitchManager 7.0 | 7.0 all versions | Migrate to a fixed release |
Acknowledgement
Internally discovered and reported by Goutham Rukmasah from Fortinet's FortiGuard Labs .Timeline
2024-08-13: Initial publication