Dismissed
Permalink
CVE-2026-25815
3.2 LOW
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
4 packages
- terraform-providers.fortios
- python312Packages.fortiosapi
- python313Packages.fortiosapi
- python314Packages.fortiosapi
- @LeSuisse dismissed
Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials …
Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026 (by default, the encryption key is the same across all customers' installations). NOTE: the Supplier's position is that the instance of CWE-1394 is not a vulnerability because customers "are supposed to enable" a non-default option that eliminates the weakness. However, that non-default option can disrupt functionality as shown in the "Managing FortiGates with private data encryption" document, and is therefore intentionally not a default option.
References
- https://www.cert.at/en/blog/2026/1/threat-actors-use-forticloud-to-collect-ldap…
- https://docs.fortinet.com/document/fortimanager/7.6.6/administration-guide/3033…
- https://www.cert.at/en/blog/2026/1/threat-actors-use-forticloud-to-collect-ldap…
- https://docs.fortinet.com/document/fortimanager/7.6.6/administration-guide/3033…
- https://www.cert.at/en/blog/2026/1/threat-actors-use-forticloud-to-collect-ldap…
- https://docs.fortinet.com/document/fortimanager/7.6.6/administration-guide/3033…
Affected products
FortiOS
- =<7.6.6