Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Warns of New Attacks Exploiting Old Vulnerability

Fortinet Warns of New Attacks Exploiting Old Vulnerability

Posted on December 29, 2025December 29, 2025 By CWS

Fortinet final week warned {that a} five-year-old improper authentication flaw in FortiOS is as soon as once more in attackers’ crosshairs.

Tracked as CVE-2020-12812, the exploited FortiOS vulnerability exists as a result of, in sure configurations, customers can authenticate with out being prompted for two-factor authentication (2FA).

The safety defect, Fortinet says, is because of variations within the conduct of FortiGate and LDAP Listing in the case of authentication: whereas FortiGate treats usernames as case-sensitive by default, LDAP Listing doesn’t.

Attackers can change the case of the username, which ends up in the impacted equipment not requesting the second issue of authentication (FortiToken).

“This occurs when two-factor authentication is enabled within the ‘person native’ setting, and that person authentication kind is ready to a distant authentication methodology,” Fortinet stated in July 2020.

CVE-2020-12812 is thought to have been exploited in assaults, together with by ransomware teams and state-sponsored risk actors.

Now, Fortinet says hackers are as soon as once more abusing the vulnerability to bypass 2FA, however solely in opposition to particular configurations. From Fortinet’s recent advisory:

To set off this difficulty, a corporation should have the next configuration current:

Native person entries on the FortiGate with 2FA, referencing again to LDAP:

The identical customers have to be members of a bunch on the LDAP server. Instance: person jsmith is a member of ‘Area Customers’, ‘Helpdesk’.

At the least one LDAP group the two-factor customers are a member of must be configured on FortiGate e.g. ‘Area Customers’, ‘Helpdesk’, and the group must be utilized in an authentication coverage which may embrace for instance administrative customers, SSL or IPSEC VPN.

If all of the stipulations are met, attackers could change the legitimate username of an admin or VPN person to something that’s not a precise case match, which ends up in the 2FA token not being requested.

“If this has occurred, system configuration must be thought of as compromised and all credentials reset together with these utilized in LDAP/AD Binding,” Fortinet notes.Commercial. Scroll to proceed studying.

Mitigations for the safety defect had been launched in FortiOS variations 6.0.10, 6.2.4, 6.4.1. Organizations ought to replace to newer iterations to forestall exploitation.

“With username-sensitivity set to disabled, FortiGate will deal with jsmith, JSmith, JSMITH and all doable mixtures as similar and due to this fact forestall failover to every other misconfigured LDAP group setting,” Fortinet notes.

The corporate additionally factors out that, as a result of the problem might be triggered if a secondary LDAP Group is configured and used when the native LDAP authentication fails, organizations ought to take away the secondary LDAP Group if it isn’t required.

Associated: In-the-Wild Exploitation of Contemporary Fortinet Flaws Begins

Associated: Fortinet Patches Important Authentication Bypass Vulnerabilities

Associated: Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week

Associated: Fortinet Confirms Energetic Exploitation of Important FortiWeb Vulnerability

Security Week News Tags:Attacks, Exploiting, Fortinet, Vulnerability, Warns

Post navigation

Previous Post: Coupang to Issue $1.17 Billion in Vouchers Over Data Breach
Next Post: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

Related Posts

Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment Organizations Warned of Vulnerability in Microsoft Exchange Hybrid Deployment Security Week News
Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities Security Week News
Microsoft to Update Windows Secure Boot in 2026 Microsoft to Update Windows Secure Boot in 2026 Security Week News
Salesloft GitHub Account Compromised Months Before Salesforce Attack Salesloft GitHub Account Compromised Months Before Salesforce Attack Security Week News
McDonald’s Chatbot Recruitment Platform Leaked 64 Million Job Applications McDonald’s Chatbot Recruitment Platform Leaked 64 Million Job Applications Security Week News
Coyote Banking Trojan First to Abuse Microsoft UIA Coyote Banking Trojan First to Abuse Microsoft UIA Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News