Connect with us

Security

Critical Security Alert: Massive Exposure of Fortinet Firewalls Leads to Widespread 2FA Bypass Attacks

Published

on

Over 10,000 Fortinet Firewalls Still Vulnerable to Critical 2FA Bypass Vulnerability

Fortinet firewalls are at risk as over 10,000 devices remain exposed and vulnerable to attacks exploiting a critical two-factor authentication (2FA) bypass vulnerability that has been known for five years.

In July 2020, Fortinet released updates for FortiOS versions 6.4.1, 6.2.4, and 6.0.10 to address this flaw, identified as CVE-2020-12812. Admins who couldn’t immediately apply the patches were advised to disable username-case-sensitivity to prevent 2FA bypass attempts on their devices.

The severity of this security flaw, rated at 9.8/10, lies in the improper authentication of FortiGate SSL VPN, allowing unauthorized access to unpatched firewalls without the required second factor of authentication (FortiToken) when the username’s case is modified.

Wiz

Recent reports indicate that attackers are still leveraging CVE-2020-12812 to target vulnerable Fortinet firewalls, especially those configurations that require LDAP to be enabled.

Fortinet highlighted the ongoing abuse of the July 2020 vulnerability, emphasizing specific configurations that are being exploited in the wild.

Internet security watchdog Shadowserver revealed that more than 10,000 Fortinet firewalls are still exposed online and unpatched against CVE-2020-12812, making them susceptible to these ongoing attacks, with a significant number of vulnerable devices located in the United States.

Fortinet firewalls exposed to CVE-2020-12812 attacks
Fortinet firewalls exposed to CVE-2020-12812 attacks (Shadowserver)

In April 2021, CISA and the FBI cautioned about state-sponsored hacking groups targeting Fortinet FortiOS instances using exploits for multiple vulnerabilities, including CVE-2020-12812, to bypass 2FA.

Subsequently, CISA listed CVE-2020-12812 as a known exploited vulnerability, linking it to ransomware attacks and instructing U.S. federal agencies to secure their systems by May 2022.

See also  Amazon's Massive Purchase: Rivian's Pedal-Assist Cargo Bikes

Fortinet vulnerabilities, particularly zero-day exploits, are frequently targeted by threat actors. For example, cybersecurity firm Arctic Wolf raised an alarm in December about threat actors exploiting a critical authentication bypass vulnerability (CVE-2025-59718) to compromise admin accounts via malicious single sign-on (SSO) logins.

Fortinet also disclosed the exploitation of FortiWeb zero-day vulnerabilities, with one (CVE-2025-58034) being actively abused and another (CVE-2025-64446) silently patched after widespread attacks.

Moreover, the Chinese Volt Typhoon threat group exploited two FortiOS flaws (CVE-2023-27997 and CVE-2022-42475) to compromise a Dutch Ministry of Defence military network using custom Coathanger remote access trojan malware in February 2025.

Wiz

As Model Context Protocol (MCP) gains prominence in connecting LLMs to tools and data, security teams are actively enhancing the safety of these new services.

Discover 7 best practices in this free cheat sheet to enhance your security measures.

Trending