PT-2020-6439 · Fortinet · Fortios

Published

2020-07-13

·

Updated

2026-01-06

·

CVE-2020-12812

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions FortiOS versions 6.0.0 through 6.0.9 FortiOS versions 6.2.0 through 6.2.3 FortiOS version 6.4.0
Description An improper authentication issue exists in the SSL VPN functionality of FortiOS. This allows attackers to bypass two-factor authentication (2FA) by manipulating the case of their username during login, particularly in configurations utilizing LDAP for authentication. The vulnerability, tracked as CVE-2020-12812, has been actively exploited since 2020 and continues to be a threat, with reports of ongoing exploitation in late 2025. The issue arises from inconsistent case-sensitive matching between the FortiGate firewall and the LDAP directory server. Successful exploitation can grant unauthorized access to VPN resources and potentially administrative accounts. Threat actors, including the GoldenJackal group, have been observed leveraging this vulnerability. Approximately 5.7 million Fortinet Firewall instances are exposed. The API endpoint used for authentication is susceptible to this issue, with the
username
parameter being a key factor in the bypass. The
checkPassword()
function is implicated in the authentication process.
Recommendations FortiOS versions 6.0.0 through 6.0.9: Update to a version later than 6.0.9. FortiOS versions 6.2.0 through 6.2.3: Update to a version later than 6.2.3. FortiOS version 6.4.0: Update to a version later than 6.4.0. Disable username case sensitivity in the FortiOS configuration. Remove the secondary LDAP group if it is not required. Audit logs for unusual login activity or 2FA bypass attempts.

Fix

Improper Authentication

Weakness Enumeration

Related Identifiers

BDU:2021-04724
CVE-2020-12812

Affected Products

Fortios