Vulnerability Description
An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version 7.4.6 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions may allow an attacker in possession of a cookie used to log in the SSL-VPN portal to log in again, although the session has expired or was logged out.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortisase | 24.4.60 |
| Fortinet | Fortios | >= 6.4.0, < 7.2.11 |
Related Weaknesses (CWE)
References
- https://fortiguard.fortinet.com/psirt/FG-IR-24-339Vendor Advisory
FAQ
What is CVE-2024-50562?
CVE-2024-50562 is a vulnerability with a CVSS score of 4.8 (MEDIUM). An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version 7.4.6 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions may allow an attacker...
How severe is CVE-2024-50562?
CVE-2024-50562 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-50562?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortisase, Fortinet Fortios.