cvelist/2020/6xxx/CVE-2020-6644.json

65 lines
2.1 KiB
JSON
Raw Normal View History

2020-01-09 14:01:06 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-6644",
2020-06-22 16:01:25 +00:00
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "Fortinet FortiDeceptor",
"version": {
"version_data": [
{
"version_value": "3.0.0 and below"
},
{
"version_value": "Fixed in 3.0.1"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://fortiguard.com/advisory/FG-IR-20-006",
"url": "https://fortiguard.com/advisory/FG-IR-20-006"
}
]
2020-01-09 14:01:06 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-06-22 16:01:25 +00:00
"value": "An insufficient session expiration vulnerability in FortiDeceptor 3.0.0 and below allows an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID via other, hypothetical attacks."
2020-01-09 14:01:06 +00:00
}
]
}
}