Home

Description

An insufficient session expiration vulnerability [CWE-613] in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control

PUBLISHED Reserved 2025-10-17 | Published 2025-12-09 | Updated 2025-12-09 | Assigner fortinet




MEDIUM: 5.3CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C

Problem types

Improper access control

Product status

Default status
unaffected

7.4.0
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

6.4.0 (semver)
affected

References

fortiguard.fortinet.com/psirt/FG-IR-25-411

cve.org (CVE-2025-62631)

nvd.nist.gov (CVE-2025-62631)

Download JSON