CVE-2024-27779

An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:*:*:*:*:*:*:*:*

History

22 Jul 2025, 17:07

Type Values Removed Values Added
References () https://fortiguard.fortinet.com/psirt/FG-IR-24-035 - () https://fortiguard.fortinet.com/psirt/FG-IR-24-035 - Vendor Advisory
CPE cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiisolator:*:*:*:*:*:*:*:*
First Time Fortinet fortiisolator
Fortinet fortisandbox
Fortinet

18 Jul 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-18 08:15

Updated : 2025-07-22 17:07


NVD link : CVE-2024-27779

Mitre link : CVE-2024-27779


JSON object : View

Products Affected

fortinet

  • fortisandbox
  • fortiisolator
CWE
CWE-613

Insufficient Session Expiration