PSIRT Advisory

FortiGate SSL VPN logs may display events of users in a different VDOM


An exposure of sensitive information to an unauthorized actor vulnerability in FortiGate may allow a remote authenticated attacker to read the SSL VPN events log entries of users in other VDOMs by  executing "get vpn ssl monitor" from the CLI. The sensitive data includes usernames, user groups, and IP addresses.


Information disclosure

Affected Products

FortiGate versions 6.0.10 and below. 

FortiGate versions 6.2.4 and below. 

FortiGate versions 6.4.1 and below.


Please upgrade to FortiGate version 6.0.11 or above. 

Please upgrade to FortiGate version 6.2.5 or above.

Please upgrade to FortiGate version 6.4.2 or above.