An insufficient session expiration vulnerability [CWE-613] vulnerability in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-411 | Vendor Advisory |
Configurations
History
14 Jan 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) An insufficient session expiration vulnerability [CWE-613] vulnerability in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control |
09 Dec 2025, 20:29
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | |
| First Time |
Fortinet
Fortinet fortios |
|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-411 - Vendor Advisory |
09 Dec 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 18:16
Updated : 2026-01-14 10:16
NVD link : CVE-2025-62631
Mitre link : CVE-2025-62631
CVE.ORG link : CVE-2025-62631
JSON object : View
Products Affected
fortinet
- fortios
CWE
CWE-613
Insufficient Session Expiration
