CVE-2025-62631
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-09

Assigner: Fortinet, Inc.

Description
An insufficient session expiration vulnerability [CWE-613] in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-09
Generated
2026-05-07
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
fortinet fortios 7.2
fortinet fortios 6.4
fortinet fortios 7.0
fortinet fortios 7.4.0
fortinet fortios From 7.4.0 (inc) to 7.4.9 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-613 According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an insufficient session expiration issue in Fortinet FortiOS versions 6.4, 7.0, 7.2, and 7.4.0. It allows an attacker to maintain access to network resources through an active SSLVPN session that is not terminated after a user changes their password, under certain conditions outside the attacker's control.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to continue accessing network resources even after a user changes their password, potentially leading to unauthorized access, data exposure, and compromise of network security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart