An insufficient session expiration vulnerability [CWE-613] in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-411 | Vendor Advisory |
Configurations
History
09 Dec 2025, 20:29
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | |
| First Time |
Fortinet
Fortinet fortios |
|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-411 - Vendor Advisory |
09 Dec 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 18:16
Updated : 2025-12-09 20:29
NVD link : CVE-2025-62631
Mitre link : CVE-2025-62631
CVE.ORG link : CVE-2025-62631
JSON object : View
Products Affected
fortinet
- fortios
CWE
CWE-613
Insufficient Session Expiration
