An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/advisory/FG-IR-20-072 |
![]() ![]() |
History
Tue, 22 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-22T21:02:02.463Z
Reserved: 2021-01-13T00:00:00
Link: CVE-2021-24019

Updated: 2024-08-03T19:14:10.075Z

Status : Modified
Published: 2021-10-06T10:15:07.713
Modified: 2024-11-21T05:52:13.237
Link: CVE-2021-24019

No data.