Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25815: CWE-1394 Use of Default Cryptographic Key in Fortinet FortiOS

0
Low
VulnerabilityCVE-2026-25815cvecve-2026-25815cwe-1394
Published: Thu Feb 05 2026 (02/05/2026, 21:14:09 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026 (by default, the encryption key is the same across all customers' installations). NOTE: the Supplier's position is that the instance of CWE-1394 is not a vulnerability because customers "are supposed to enable" a non-default option that eliminates the weakness. However, that non-default option can disrupt functionality as shown in the "Managing FortiGates with private data encryption" document, and is therefore intentionally not a default option.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/13/2026, 07:14:30 UTC

Technical Analysis

CVE-2026-25815 identifies a cryptographic weakness in Fortinet FortiOS versions through 7.6.6, where LDAP credentials stored in device configuration files are encrypted using a default cryptographic key that is identical across all customer installations. This default key usage falls under CWE-1394 (Use of Default Cryptographic Key), which undermines the confidentiality of stored credentials. Attackers with local access to the device configuration files can decrypt these LDAP credentials, potentially gaining unauthorized access to LDAP services. The vendor's stance is that this is not a vulnerability if customers enable a non-default encryption option that uses unique keys per installation, but this option is disabled by default because enabling it can disrupt FortiGate management functionality, as documented in Fortinet's "Managing FortiGates with private data encryption" guide. The vulnerability has a CVSS 3.1 base score of 3.2, reflecting low severity due to the requirement for local access, high attack complexity, no privileges required, and no user interaction. The scope is considered changed because the confidentiality of LDAP credentials is impacted, but integrity and availability remain unaffected. Although exploitation in the wild has been reported since December 2025, no public exploit code or widespread attacks have been documented. The vulnerability primarily threatens organizations that have not enabled the stronger encryption option and rely on FortiOS devices for LDAP authentication, as attackers could leverage decrypted credentials to access directory services and potentially escalate privileges or move laterally within networks.

Potential Impact

For European organizations, the exposure of LDAP credentials due to this vulnerability can lead to unauthorized access to directory services, which are critical for authentication and authorization in enterprise environments. This could facilitate lateral movement, privilege escalation, and data exfiltration if attackers gain footholds within networks. Although the vulnerability requires local access to device configuration files, insider threats or attackers who have already compromised network segments could exploit it. The impact is particularly significant for sectors relying heavily on Fortinet FortiOS devices for network security and LDAP-based authentication, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators. The confidentiality breach of LDAP credentials could undermine trust in identity management systems and complicate incident response efforts. However, the lack of impact on integrity and availability, combined with the high attack complexity and local access requirement, limits the overall risk. Still, organizations that do not enable the recommended encryption option remain vulnerable to credential compromise, which could cascade into broader security incidents.

Mitigation Recommendations

European organizations should immediately audit their FortiOS devices to determine if the default cryptographic key setting is in use for LDAP credential encryption. They should enable the non-default encryption option that uses unique cryptographic keys per installation, despite potential disruptions, and plan for operational adjustments accordingly. To minimize disruption, testing this configuration in controlled environments before widespread deployment is advised. Additionally, organizations should restrict local access to FortiOS device configuration files through strict access controls, monitoring, and logging to detect unauthorized access attempts. Employing network segmentation and limiting administrative privileges can reduce the risk of attackers obtaining local access. Regularly updating FortiOS to the latest versions, once patches or improved configurations are available, is critical. Organizations should also consider implementing multi-factor authentication for LDAP services and monitoring for anomalous authentication activities that might indicate credential misuse. Finally, educating administrators about the risks of default cryptographic keys and the importance of secure configuration management will help prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-05T21:14:09.087Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69850be1f9fa50a62f3fbedd

Added to database: 2/5/2026, 9:30:09 PM

Last enriched: 2/13/2026, 7:14:30 AM

Last updated: 3/22/2026, 9:26:57 AM

Views: 812

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses