Description
An insufficient session expiration in Fortinet FortiOS 7.0.0 - 7.0.12 and 7.2.0 - 7.2.4 allows an attacker to execute unauthorized code or commands via reusing the session of a deleted user in the REST API.
Published: 2023-07-11
Score: 4.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Please upgrade to FortiOS version 7.4.0 or above

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-31726 An insufficient session expiration in Fortinet FortiOS 7.0.0 - 7.0.12 and 7.2.0 - 7.2.4 allows an attacker to execute unauthorized code or commands via reusing the session of a deleted user in the REST API.
References
History

Tue, 22 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Fortinet Fortios
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-10-22T20:41:43.447Z

Reserved: 2023-03-09T10:09:33.120Z

Link: CVE-2023-28001

cve-icon Vulnrichment

Updated: 2024-08-02T12:23:30.802Z

cve-icon NVD

Status : Modified

Published: 2023-07-11T17:15:12.883

Modified: 2024-11-21T07:53:54.557

Link: CVE-2023-28001

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses