An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted.
History

Tue, 22 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:fortinet:fortiisolator:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*

Fri, 18 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Jul 2025 08:15:00 +0000

Type Values Removed Values Added
Description An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted.
First Time appeared Fortinet
Fortinet fortiisolator
Fortinet fortisandbox
Weaknesses CWE-613
CPEs cpe:2.3:a:fortinet:fortiisolator:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.2.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:4.4.4:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiisolator
Fortinet fortisandbox
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L/E:P/RL:X/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2025-07-18T07:58:23.943Z

Updated: 2025-07-19T03:55:13.564Z

Reserved: 2024-02-26T14:46:31.334Z

Link: CVE-2024-27779

cve-icon Vulnrichment

Updated: 2025-07-18T13:16:53.596Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-18T08:15:25.850

Modified: 2025-07-22T17:07:27.987

Link: CVE-2024-27779

cve-icon Redhat

No data.