Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/CyberSecurity News/Fortinet Firewalls Exposed to 5-Year-Old Vulnerability
CyberSecurity News

Fortinet Firewalls Exposed to 5-Year-Old Vulnerability

Fortinet Firewalls Exposed to 5-Year-Old Vulnerability Can you believe it? Over 10,000 Fortinet firewalls around the world are still sitting out there, vulnerable. We’re talking about...

David kimber
David kimber
January 2, 2026 2 Min Read
22 0

Fortinet Firewalls Exposed to 5-Year-Old Vulnerability

Can you believe it? Over 10,000 Fortinet firewalls around the world are still sitting out there, vulnerable. We’re talking about CVE-2020-12812, which is a multi-factor authentication (MFA) bypass flaw. And here’s the kicker: this bug was actually disclosed more than five and a half years ago.

Shadowserver recently added the issue to its daily Vulnerable HTTP Report, highlighting persistent exposure amid active exploitation confirmed by Fortinet in late 2025.​

CVE-2020-12812 stems from improper authentication in FortiOS SSL VPN portals, affecting versions 6.4.0, 6.2.0 through 6.2.3, and 6.0.9 and earlier. Attackers can bypass the second authentication factor, typically FortiToken, by simply altering the case of a legitimate username, such as changing “user” to “User,” during login.

This occurs due to mismatched case sensitivity: FortiGate treats local usernames as case-sensitive, while LDAP servers (like Active Directory) often ignore case, allowing authentication via group membership without prompting for MFA.​

The flaw carries a CVSS v3.1 base score of 7.5 (High), with network accessibility, low complexity, and potential for confidentiality, integrity, and availability impacts. It was added to CISA’s Known Exploited Vulnerabilities catalog in 2021 after ransomware actors leveraged it.​

In December 2025, Fortinet issued a PSIRT advisory (FG-IR-19-283 update) detailing “recent abuse” of the vulnerability in the wild, tied to specific configurations: local FortiGate users with MFA enabled, linked to LDAP, and belonging to LDAP groups mapped to authentication policies for SSL VPN, IPsec, or admin access. Threat actors exploited this to gain unauthorized internal network access, prompting Fortinet to urge immediate checks and patches.​

Shadowserver’s scans confirm the flaw’s persistence, scanning for vulnerable HTTP services on exposed ports.​

We added Fortinet SSL-VPN CVE-2020-12812 to our daily Vulnerable HTTP Report: https://t.co/qxv0Gv6cAK

After 5 1/2 years since being published still over 10K Fortinet firewalls remain unpatched. Vuln actively exploited as recently highlighted by Fortinet: https://t.co/fg62K4cjso pic.twitter.com/PXo4QzWTWo

— The Shadowserver Foundation (@Shadowserver) January 2, 2026

Shadowserver’s dashboard reveals over 10,000 vulnerable instances as of early January 2026. The United States dominates with 1.3K exposed firewalls, followed by Thailand (909), Taiwan (728), Japan (462), and China (462).

A world map visualization shows dense clusters in North America, East Asia, and Europe, with lighter exposure in Africa and parts of South America.​

Top Countries Vulnerable Count
United States 1.3K​
Thailand 909​
Taiwan 728​
Japan 462​
China 462​

Fortinet recommends upgrading to fixed FortiOS versions (6.0.10+, 6.2.4+, 6.4.1+) and verifying configurations to avoid hybrid local-LDAP MFA setups.

Disable unnecessary SSL VPN exposure, enforce least privilege, and monitor logs for case-variant login attempts. Organizations should subscribe to Shadowserver reports for tailored alerts and run their Vulnerable HTTP scans promptly.​

This ongoing threat underscores the risks posed by legacy vulnerabilities in enterprise firewalls, which can enable ransomware or lateral movement within breached networks.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVEExploitIosPatchransomwareThreatUpdateVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Mongobleed (CVE-2025- Lessons Vulnerability Exploit

Next Post

RondoDoX Botnet Exploits Critical React2Shell Vulnerability

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us