Insufficient Session Expiration in SSLVPN using SAML authentication

Summary

An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.

Version Affected Solution
FortiOS 7.6 7.6.0 through 7.6.2 Upgrade to 7.6.3 or above
FortiOS 7.4 7.4.0 through 7.4.6 Upgrade to 7.4.7 or above
FortiOS 7.2 7.2.0 through 7.2.10 Upgrade to 7.2.11 or above
FortiOS 7.0 7.0.0 through 7.0.16 Upgrade to 7.0.17 or above
FortiOS 6.4 6.4 all versions Migrate to a fixed release
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Workaround:
Use FortiClient built-in browser during SAML authentication without enabling "Use external browser as user-agent for saml user authentication".

Acknowledgement

Fortinet is pleased to thank William Le Berre from BZHunt for reporting this vulnerability under responsible disclosure.

Timeline

2025-10-14: Initial publication