CVE-2024-50562

An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version 7.4.6 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions may allow an attacker in possession of a cookie used to log in the SSL-VPN portal to log in again, although the session has expired or was logged out.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortisase:24.4.60:*:*:*:-:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-06-10 17:19

Updated : 2025-07-25 15:25


NVD link : CVE-2024-50562

Mitre link : CVE-2024-50562

CVE.ORG link : CVE-2024-50562


JSON object : View

Products Affected

fortinet

  • fortios
  • fortisase
CWE
CWE-613

Insufficient Session Expiration