CVE-2024-27779

Severity
6.7MEDIUM
EPSS
0.1%
top 65.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 18

Description

An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 4.4.4 and below, version 4.2.6 and below, 4.0 all versions, 3.2 all versions and FortiIsolator version 2.4 and below, 2.3 all versions, 2.2 all versions, 2.1 all versions, 2.0 all versions, 1.2 all versions may allow a remote attacker in possession of an admin session cookie to keep using that admin's session even after the admin user was deleted.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:LExploitability: 1.2 | Impact: 5.5

Affected Packages4 packages

NVDfortinet/fortisandbox3.2.04.2.7+1
CVEListV5fortinet/fortisandbox4.4.04.4.4+3
NVDfortinet/fortiisolator1.2.02.4.5
CVEListV5fortinet/fortiisolator2.4.02.4.4+5

🔴Vulnerability Details

2
CVEList
CVE-2024-27779: An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 42025-07-18
GHSA
GHSA-m8h2-gg48-m54f: An insufficient session expiration vulnerability [CWE-613] in FortiSandbox FortiSandbox version 42025-07-18

📋Vendor Advisories

1
Fortinet
Session still active for deleted admin2025-07-18
CVE-2024-27779 (MEDIUM CVSS 6.7) | An insufficient session expiration | cvebase.io