Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Warns of New Attacks Exploiting Old Vulnerability

Fortinet Warns of New Attacks Exploiting Old Vulnerability

Posted on December 29, 2025December 29, 2025 By CWS

Fortinet final week warned {that a} five-year-old improper authentication flaw in FortiOS is as soon as once more in attackers’ crosshairs.

Tracked as CVE-2020-12812, the exploited FortiOS vulnerability exists as a result of, in sure configurations, customers can authenticate with out being prompted for two-factor authentication (2FA).

The safety defect, Fortinet says, is because of variations within the conduct of FortiGate and LDAP Listing in the case of authentication: whereas FortiGate treats usernames as case-sensitive by default, LDAP Listing doesn’t.

Attackers can change the case of the username, which ends up in the impacted equipment not requesting the second issue of authentication (FortiToken).

“This occurs when two-factor authentication is enabled within the ‘person native’ setting, and that person authentication kind is ready to a distant authentication methodology,” Fortinet stated in July 2020.

CVE-2020-12812 is thought to have been exploited in assaults, together with by ransomware teams and state-sponsored risk actors.

Now, Fortinet says hackers are as soon as once more abusing the vulnerability to bypass 2FA, however solely in opposition to particular configurations. From Fortinet’s recent advisory:

To set off this difficulty, a corporation should have the next configuration current:

Native person entries on the FortiGate with 2FA, referencing again to LDAP:

The identical customers have to be members of a bunch on the LDAP server. Instance: person jsmith is a member of ‘Area Customers’, ‘Helpdesk’.

At the least one LDAP group the two-factor customers are a member of must be configured on FortiGate e.g. ‘Area Customers’, ‘Helpdesk’, and the group must be utilized in an authentication coverage which may embrace for instance administrative customers, SSL or IPSEC VPN.

If all of the stipulations are met, attackers could change the legitimate username of an admin or VPN person to something that’s not a precise case match, which ends up in the 2FA token not being requested.

“If this has occurred, system configuration must be thought of as compromised and all credentials reset together with these utilized in LDAP/AD Binding,” Fortinet notes.Commercial. Scroll to proceed studying.

Mitigations for the safety defect had been launched in FortiOS variations 6.0.10, 6.2.4, 6.4.1. Organizations ought to replace to newer iterations to forestall exploitation.

“With username-sensitivity set to disabled, FortiGate will deal with jsmith, JSmith, JSMITH and all doable mixtures as similar and due to this fact forestall failover to every other misconfigured LDAP group setting,” Fortinet notes.

The corporate additionally factors out that, as a result of the problem might be triggered if a secondary LDAP Group is configured and used when the native LDAP authentication fails, organizations ought to take away the secondary LDAP Group if it isn’t required.

Associated: In-the-Wild Exploitation of Contemporary Fortinet Flaws Begins

Associated: Fortinet Patches Important Authentication Bypass Vulnerabilities

Associated: Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week

Associated: Fortinet Confirms Energetic Exploitation of Important FortiWeb Vulnerability

Security Week News Tags:Attacks, Exploiting, Fortinet, Vulnerability, Warns

Post navigation

Previous Post: Coupang to Issue $1.17 Billion in Vouchers Over Data Breach
Next Post: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

Related Posts

New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data Security Week News
Senate Committee Advances Trump Nominee to Lead CISA Senate Committee Advances Trump Nominee to Lead CISA Security Week News
CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability Security Week News
Portal26 Raises  Million for Gen-AI Adoption Platform Portal26 Raises $9 Million for Gen-AI Adoption Platform Security Week News
Webinar Today: The Future of Industrial Network Security Webinar Today: The Future of Industrial Network Security Security Week News
Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News