Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Warns of New Attacks Exploiting Old Vulnerability

Fortinet Warns of New Attacks Exploiting Old Vulnerability

Posted on December 29, 2025December 29, 2025 By CWS

Fortinet final week warned {that a} five-year-old improper authentication flaw in FortiOS is as soon as once more in attackers’ crosshairs.

Tracked as CVE-2020-12812, the exploited FortiOS vulnerability exists as a result of, in sure configurations, customers can authenticate with out being prompted for two-factor authentication (2FA).

The safety defect, Fortinet says, is because of variations within the conduct of FortiGate and LDAP Listing in the case of authentication: whereas FortiGate treats usernames as case-sensitive by default, LDAP Listing doesn’t.

Attackers can change the case of the username, which ends up in the impacted equipment not requesting the second issue of authentication (FortiToken).

“This occurs when two-factor authentication is enabled within the ‘person native’ setting, and that person authentication kind is ready to a distant authentication methodology,” Fortinet stated in July 2020.

CVE-2020-12812 is thought to have been exploited in assaults, together with by ransomware teams and state-sponsored risk actors.

Now, Fortinet says hackers are as soon as once more abusing the vulnerability to bypass 2FA, however solely in opposition to particular configurations. From Fortinet’s recent advisory:

To set off this difficulty, a corporation should have the next configuration current:

Native person entries on the FortiGate with 2FA, referencing again to LDAP:

The identical customers have to be members of a bunch on the LDAP server. Instance: person jsmith is a member of ‘Area Customers’, ‘Helpdesk’.

At the least one LDAP group the two-factor customers are a member of must be configured on FortiGate e.g. ‘Area Customers’, ‘Helpdesk’, and the group must be utilized in an authentication coverage which may embrace for instance administrative customers, SSL or IPSEC VPN.

If all of the stipulations are met, attackers could change the legitimate username of an admin or VPN person to something that’s not a precise case match, which ends up in the 2FA token not being requested.

“If this has occurred, system configuration must be thought of as compromised and all credentials reset together with these utilized in LDAP/AD Binding,” Fortinet notes.Commercial. Scroll to proceed studying.

Mitigations for the safety defect had been launched in FortiOS variations 6.0.10, 6.2.4, 6.4.1. Organizations ought to replace to newer iterations to forestall exploitation.

“With username-sensitivity set to disabled, FortiGate will deal with jsmith, JSmith, JSMITH and all doable mixtures as similar and due to this fact forestall failover to every other misconfigured LDAP group setting,” Fortinet notes.

The corporate additionally factors out that, as a result of the problem might be triggered if a secondary LDAP Group is configured and used when the native LDAP authentication fails, organizations ought to take away the secondary LDAP Group if it isn’t required.

Associated: In-the-Wild Exploitation of Contemporary Fortinet Flaws Begins

Associated: Fortinet Patches Important Authentication Bypass Vulnerabilities

Associated: Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week

Associated: Fortinet Confirms Energetic Exploitation of Important FortiWeb Vulnerability

Security Week News Tags:Attacks, Exploiting, Fortinet, Vulnerability, Warns

Post navigation

Previous Post: Coupang to Issue $1.17 Billion in Vouchers Over Data Breach
Next Post: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

Related Posts

Backdoored Open Source Malware Repositories Target Novice Cybercriminals Backdoored Open Source Malware Repositories Target Novice Cybercriminals Security Week News
Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway Critical Flaw Allows Remote Hacking of AutomationDirect Industrial Gateway Security Week News
RSAC Unveils Quantickle: Open Source Threat Visualization Tool RSAC Unveils Quantickle: Open Source Threat Visualization Tool Security Week News
Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks Security Week News
Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities Security Week News
Microsoft Reduces Israel’s Access to Cloud and AI Products Over Reports of Mass Surveillance in Gaza Microsoft Reduces Israel’s Access to Cloud and AI Products Over Reports of Mass Surveillance in Gaza Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark