Long lived sessions in Fortinet FortiGate devices with FortiOS 5.x prior to 5.4.0 could violate a security policy during IPS signature updates when the FortiGate's IPSengine is configured in flow mode. All FortiGate versions with IPS configured in proxy mode (the default mode) are not affected.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fortinet fortios 5.0.14 |
||
fortinet fortios 5.2.8 |
||
fortinet fortios 5.2.1 |
||
fortinet fortios 5.0.13 |
||
fortinet fortios 5.0.6 |
||
fortinet fortios 5.0.4 |
||
fortinet fortios 5.2.10 |
||
fortinet fortios 5.0.12 |
||
fortinet fortios 5.0.11 |
||
fortinet fortios 5.0.10 |
||
fortinet fortios 5.0.9 |
||
fortinet fortios 5.0.8 |
||
fortinet fortios 5.2.6 |
||
fortinet fortios 5.2.5 |
||
fortinet fortios 5.2.4 |
||
fortinet fortios 5.2.3 |
||
fortinet fortios 5.0.3 |
||
fortinet fortios 5.0.2 |
||
fortinet fortios 5.0.1 |
||
fortinet fortios 5.0.0 |
||
fortinet fortios 5.2.9 |
||
fortinet fortios 5.2.7 |
||
fortinet fortios 5.2.2 |
||
fortinet fortios 5.2.0 |
||
fortinet fortios 5.0.7 |
||
fortinet fortios 5.0.5 |