PT-2020-6439 · Fortinet · Fortios
Published
2020-07-13
·
Updated
2026-01-06
·
CVE-2020-12812
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
FortiOS versions 6.0.0 through 6.0.9
FortiOS versions 6.2.0 through 6.2.3
FortiOS version 6.4.0
Description
An improper authentication issue exists in the SSL VPN functionality of FortiOS. This allows attackers to bypass two-factor authentication (2FA) by manipulating the case of their username during login, particularly in configurations utilizing LDAP for authentication. The vulnerability, tracked as CVE-2020-12812, has been actively exploited since 2020 and continues to be a threat, with reports of ongoing exploitation in late 2025. The issue arises from inconsistent case-sensitive matching between the FortiGate firewall and the LDAP directory server. Successful exploitation can grant unauthorized access to VPN resources and potentially administrative accounts. Threat actors, including the GoldenJackal group, have been observed leveraging this vulnerability. Approximately 5.7 million Fortinet Firewall instances are exposed. The API endpoint used for authentication is susceptible to this issue, with the
username parameter being a key factor in the bypass. The checkPassword() function is implicated in the authentication process.Recommendations
FortiOS versions 6.0.0 through 6.0.9: Update to a version later than 6.0.9.
FortiOS versions 6.2.0 through 6.2.3: Update to a version later than 6.2.3.
FortiOS version 6.4.0: Update to a version later than 6.4.0.
Disable username case sensitivity in the FortiOS configuration.
Remove the secondary LDAP group if it is not required.
Audit logs for unusual login activity or 2FA bypass attempts.
Fix
Improper Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2021-04724
CVE-2020-12812
Affected Products
Fortios
References · 58
- https://bdu.fstec.ru/vul/2021-04724 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2020-12812 · Security Note
- https://fortiguard.com/psirt/FG-IR-19-283 · Vendor Advisory
- https://twitter.com/ox0ffff/status/2005822092655174001 · Twitter Post
- https://twitter.com/BluescrollingX/status/1844094281323290671 · Twitter Post
- https://twitter.com/AnonNews_irc/status/2007183343238980009 · Twitter Post
- https://twitter.com/catnap707/status/2006172560837472593 · Twitter Post
- https://reddit.com/r/KibernetinisSaugumas/comments/1pvb4vc/fortinet_fortios_ssl_vpn_2fa_pa%C5%BEeid%C5%BEiamumas · Reddit Post
- https://twitter.com/TheHackersNews/status/2004105621340041699 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2004235733536514192 · Twitter Post
- https://t.me/aptreports/1808 · Telegram Post
- https://t.me/aptreports/2076 · Telegram Post
- https://twitter.com/catnap707/status/2006172280167051670 · Twitter Post
- https://t.me/aptreports/745 · Telegram Post
- https://t.me/true_secator/7767 · Telegram Post