First published: Tue Jun 01 2021(Updated: )
FortiGate's and FortiADC's read-only admins are able to point an LDAP server connectivity test request to a rogue LDAP server instead of the configured one, in order to obtain the LDAP server login credentials configured in the FortiGate.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortigate | ||
Fortinet FortiADC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-18-157 vulnerability is considered critical due to its potential for exposing sensitive LDAP server credentials.
To remediate FG-IR-18-157, restrict read-only admin permissions and ensure LDAP server connectivity tests are directed to the correct server.
Fortinet FortiGate and FortiADC products with read-only admin configurations are affected by the FG-IR-18-157 vulnerability.
The impact of FG-IR-18-157 includes potential unauthorized access to LDAP credentials, leading to further exploitation of the network.
The FG-IR-18-157 vulnerability was disclosed in a security advisory by Fortinet.