CVE-2025-62631

Source
https://cve.org/CVERecord?id=CVE-2025-62631
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62631.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-62631
Published
2025-12-09T18:16:03.850Z
Modified
2026-03-13T03:38:12.636621Z
Severity
  • 5.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
[none]
Details

An insufficient session expiration vulnerability [CWE-613] vulnerability in Fortinet FortiOS 7.4.0, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to maintain access to network resources via an active SSLVPN session not terminated after a user's password change under particular conditions outside of the attacker's control

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "6.4.0"
            },
            {
                "fixed": "7.4.1"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62631.json"