Back to News
vulnerability🌐InternationalThe Hacker News

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

Thursday, December 25, 2025

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

What

Fortinet identified that CVE-2020-12812, an improper authentication vulnerability in FortiOS SSL VPN, is being actively exploited. The flaw allows users to log in without two-factor authentication if the case of the username is altered, due to mismatched case sensitivity between local and LDAP authentication. This vulnerability poses significant risks as it can lead to unauthorized access to sensitive accounts, including administrative and VPN users.

Where

Global, affecting organizations using FortiOS SSL VPN configurations.

When

The vulnerability was disclosed in July 2020, with recent exploitation observed as of December 2025.

Key Factors

  • Improper authentication vulnerability in FortiOS SSL VPN (CVE-2020-12812)
  • Bypass of two-factor authentication due to case sensitivity issues
  • Active exploitation by multiple threat actors targeting perimeter devices

Takeaways

  • Organizations must ensure they are running the latest FortiOS versions to mitigate this vulnerability.
  • The incident highlights the importance of consistent authentication mechanisms across different systems.
  • Immediate action should be taken to review and adjust authentication settings to prevent unauthorized access.
Read Full Article

Opens original article on The Hacker News

Similar News