First published: Fri Jul 24 2020(Updated: )
An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | ||
FortiOS | <6.0.10 | |
FortiOS | >=6.2.0<6.2.4 | |
FortiOS | =6.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12812 is classified as a high severity vulnerability.
To fix CVE-2020-12812, upgrade FortiOS to version 6.0.10 or higher, or to versions 6.2.4 or later.
CVE-2020-12812 affects FortiOS versions 6.0.9 and below, 6.2.0 to 6.2.3, and 6.4.0.
CVE-2020-12812 is an improper authentication vulnerability in SSL VPN.
Yes, users may bypass the second factor of authentication by changing the case of their username.