Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortinet Warns of New Attacks Exploiting Old Vulnerability

Posted on December 29, 2025December 29, 2025 By CWS

Fortinet final week warned {that a} five-year-old improper authentication flaw in FortiOS is as soon as once more in attackers’ crosshairs.

Tracked as CVE-2020-12812, the exploited FortiOS vulnerability exists as a result of, in sure configurations, customers can authenticate with out being prompted for two-factor authentication (2FA).

The safety defect, Fortinet says, is because of variations within the conduct of FortiGate and LDAP Listing in the case of authentication: whereas FortiGate treats usernames as case-sensitive by default, LDAP Listing doesn’t.

Attackers can change the case of the username, which ends up in the impacted equipment not requesting the second issue of authentication (FortiToken).

“This occurs when two-factor authentication is enabled within the ‘person native’ setting, and that person authentication kind is ready to a distant authentication methodology,” Fortinet stated in July 2020.

CVE-2020-12812 is thought to have been exploited in assaults, together with by ransomware teams and state-sponsored risk actors.

Now, Fortinet says hackers are as soon as once more abusing the vulnerability to bypass 2FA, however solely in opposition to particular configurations. From Fortinet’s recent advisory:

To set off this difficulty, a corporation should have the next configuration current:

Native person entries on the FortiGate with 2FA, referencing again to LDAP:

The identical customers have to be members of a bunch on the LDAP server. Instance: person jsmith is a member of ‘Area Customers’, ‘Helpdesk’.

At the least one LDAP group the two-factor customers are a member of must be configured on FortiGate e.g. ‘Area Customers’, ‘Helpdesk’, and the group must be utilized in an authentication coverage which may embrace for instance administrative customers, SSL or IPSEC VPN.

If all of the stipulations are met, attackers could change the legitimate username of an admin or VPN person to something that’s not a precise case match, which ends up in the 2FA token not being requested.

“If this has occurred, system configuration must be thought of as compromised and all credentials reset together with these utilized in LDAP/AD Binding,” Fortinet notes.Commercial. Scroll to proceed studying.

Mitigations for the safety defect had been launched in FortiOS variations 6.0.10, 6.2.4, 6.4.1. Organizations ought to replace to newer iterations to forestall exploitation.

“With username-sensitivity set to disabled, FortiGate will deal with jsmith, JSmith, JSMITH and all doable mixtures as similar and due to this fact forestall failover to every other misconfigured LDAP group setting,” Fortinet notes.

The corporate additionally factors out that, as a result of the problem might be triggered if a secondary LDAP Group is configured and used when the native LDAP authentication fails, organizations ought to take away the secondary LDAP Group if it isn’t required.

Associated: In-the-Wild Exploitation of Contemporary Fortinet Flaws Begins

Associated: Fortinet Patches Important Authentication Bypass Vulnerabilities

Associated: Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week

Associated: Fortinet Confirms Energetic Exploitation of Important FortiWeb Vulnerability

Security Week News Tags:Attacks, Exploiting, Fortinet, Vulnerability, Warns

Post navigation

Previous Post: Coupang to Issue $1.17 Billion in Vouchers Over Data Breach
Next Post: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

Related Posts

Chrome Sandbox Escape Earns Researcher $250,000 Security Week News
China’s Salt Typhoon Hackers Target Canadian Telecom Firms Security Week News
136 NPM Packages Delivering Infostealers Downloaded 100,000 Times Security Week News
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware Security Week News
Why Sincerity Is a Strategic Asset in Cybersecurity Security Week News
Docker Makes 1,000 Hardened Images Free and Open Source Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach
  • MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
  • Fortinet Warns of New Attacks Exploiting Old Vulnerability
  • Coupang to Issue $1.17 Billion in Vouchers Over Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach
  • MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
  • Fortinet Warns of New Attacks Exploiting Old Vulnerability
  • Coupang to Issue $1.17 Billion in Vouchers Over Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark