Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploiting Three-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls

Hackers Exploiting Three-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls

Posted on December 25, 2025December 25, 2025 By CWS

Cybercriminals are actively abusing a long-patched Fortinet FortiGate flaw from July 2020, slipping previous two-factor authentication (2FA) on firewalls and probably granting unauthorized entry to VPNs and admin consoles.

Fortinet’s PSIRT group detailed the in-the-wild assaults in a latest weblog publish, urging admins to audit configurations instantly to keep away from compromise.

Dubbed FG-IR-19-283 (CVE-2020-12812), the problem stems from a mismatch in how FortiGate units deal with usernames in contrast with LDAP directories. FortiGate treats usernames as case-sensitive by default, whereas most LDAP servers, like Lively Listing, ignore case.

Attackers exploit this in misconfigured setups the place native FortiGate customers have 2FA enabled and are additionally members of LDAP teams mapped to authentication insurance policies.

The assault unfolds merely. Suppose an area consumer “jsmith” has 2FA enabled and linked to an LDAP group akin to “Area Customers.” Logging in with the precise “jsmith” triggers the token immediate.

However hackers enter “Jsmith,” “jSmith,” or any case variation. FortiGate fails to match the native consumer, then falls again to secondary authentication insurance policies tied to LDAP teams akin to “Helpdesk” or “Auth-Group.” Legitimate LDAP credentials alone suffice, bypassing 2FA completely.

Fortinet confirmed these conditions for exploitation:

Native FortiGate customers with 2FA referencing LDAP.

These customers in LDAP teams configured on FortiGate and utilized in firewall insurance policies (e.g., for SSL/IPsec VPN or admin entry).

This grants attackers VPN entry or elevated privileges with out tokens. Fortinet warns that profitable bypasses sign compromise: reset all credentials, together with LDAP/AD binding accounts, and scrutinize logs for anomalies like failed native matches adopted by LDAP successes.

The vulnerability dates again to 2020, with fixes in FortiOS 6.0.10, 6.2.4, and 6.4.1. But, unpatched or misconfigured units linger within the wild, drawing opportunistic hackers. Fortinet’s evaluation reveals attackers probing particular setups, possible scanning for outdated firmware.

Mitigations

Admins ought to prioritize these steps:

Patch Firmware: Improve to FortiOS 6.0.10+, 6.2.4+, or 6.4.1+ to dam the failover habits.

Disable Case Sensitivity: On unpatched techniques, run set username-case-sensitivity disable (FortiOS 6.0.10–6.0.12, and many others.) or set username-sensitivity disable (v6.0.13+, v6.2.10+, v6.4.7+, v7.0.1+). This normalizes usernames like “jsmith” and “JSMITH.”

Trim LDAP Teams: Take away pointless secondary teams from insurance policies. With out them, mismatched logins fail outright.

Audit Logs: Hunt for case-variant makes an attempt in authentication occasions.

Fortinet emphasizes that the absence of LDAP teams eliminates bypass threat for local-only customers. This incident underscores a harsh actuality: outdated vulnerabilities thrive on configuration drift.

With FortiGate firewalls shielding crucial networks, enterprises should implement least-privilege insurance policies and common audits. A delay may allow ransomware or lateral motion. Act now earlier than hackers crack your defenses.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:2FA, Bypass, Exploiting, Firewalls, Fortigate, Hackers, ThreeYearOld, Vulnerability

Post navigation

Previous Post: Microsoft Unveils Hardware-Accelerated BitLocker to Enhance Performance and Security
Next Post: CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution

Related Posts

Chinese Hackers Deploy NFC-enabled Android Malware to Steal Payment Data Chinese Hackers Deploy NFC-enabled Android Malware to Steal Payment Data Cyber Security News
New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers Cyber Security News
Hackers Abuse CSS Properties With Messages to Inject Malicious Codes in Hidden Text Salting Attack Hackers Abuse CSS Properties With Messages to Inject Malicious Codes in Hidden Text Salting Attack Cyber Security News
Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Cyber Security News
Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Cyber Security News
New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers New Malware Leverages Windows Character Map to Bypass Windows Defender and Mine Cryptocurrency for The Attackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Massive Cyberattack Targets Trusted Platforms with Malware
  • Rising Cyber Threats Challenge Defense Sector Security
  • Nevada Introduces New Data Classification Policy
  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Massive Cyberattack Targets Trusted Platforms with Malware
  • Rising Cyber Threats Challenge Defense Sector Security
  • Nevada Introduces New Data Classification Policy
  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark