vulnerability🌐InternationalThe Hacker News
Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability
Thursday, December 25, 2025
What
Fortinet identified that CVE-2020-12812, an improper authentication vulnerability in FortiOS SSL VPN, is being actively exploited. The flaw allows users to log in without two-factor authentication if the case of the username is altered, due to mismatched case sensitivity between local and LDAP authentication. This vulnerability poses significant risks as it can lead to unauthorized access to sensitive accounts, including administrative and VPN users.
Where
Global, affecting organizations using FortiOS SSL VPN configurations.
When
The vulnerability was disclosed in July 2020, with recent exploitation observed as of December 2025.
Key Factors
- •Improper authentication vulnerability in FortiOS SSL VPN (CVE-2020-12812)
- •Bypass of two-factor authentication due to case sensitivity issues
- •Active exploitation by multiple threat actors targeting perimeter devices
Takeaways
- →Organizations must ensure they are running the latest FortiOS versions to mitigate this vulnerability.
- →The incident highlights the importance of consistent authentication mechanisms across different systems.
- →Immediate action should be taken to review and adjust authentication settings to prevent unauthorized access.
Read Full Article
Opens original article on The Hacker News