An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-035 |
![]() ![]() |
History
Tue, 22 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:fortinet:fortiisolator:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:* |
Fri, 18 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 18 Jul 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted. | |
First Time appeared |
Fortinet
Fortinet fortiisolator Fortinet fortisandbox |
|
Weaknesses | CWE-613 | |
CPEs | cpe:2.3:a:fortinet:fortiisolator:1.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:1.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:1.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.3.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortiisolator Fortinet fortisandbox |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published: 2025-07-18T07:58:23.943Z
Updated: 2025-07-19T03:55:13.564Z
Reserved: 2024-02-26T14:46:31.334Z
Link: CVE-2024-27779

Updated: 2025-07-18T13:16:53.596Z

Status : Analyzed
Published: 2025-07-18T08:15:25.850
Modified: 2025-07-22T17:07:27.987
Link: CVE-2024-27779

No data.