CVE-2025-62631

An insufficient session expiration vulnerability [CWE-613] in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

History

09 Dec 2025, 20:29

Type Values Removed Values Added
CPE cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
First Time Fortinet
Fortinet fortios
References () https://fortiguard.fortinet.com/psirt/FG-IR-25-411 - () https://fortiguard.fortinet.com/psirt/FG-IR-25-411 - Vendor Advisory

09 Dec 2025, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-09 18:16

Updated : 2025-12-09 20:29


NVD link : CVE-2025-62631

Mitre link : CVE-2025-62631

CVE.ORG link : CVE-2025-62631


JSON object : View

Products Affected

fortinet

  • fortios
CWE
CWE-613

Insufficient Session Expiration