Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | LDAP Credentials Decryption via Default Encryption Key in FortiOS 7.6.6 |
Mon, 09 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026 (by default, the encryption key is the same across all customers' installations). NOTE: the Supplier's position is that the instance of CWE-1394 is not a vulnerability because customers "are supposed to enable" a non-default option that eliminates the weakness. However, that non-default option can disrupt functionality as shown in the "Managing FortiGates with private data encryption" document, and is therefore intentionally not a default option. | |
| First Time appeared |
Fortinet
Fortinet fortios |
|
| Weaknesses | CWE-1394 | |
| CPEs | cpe:2.3:a:fortinet:fortios:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fortinet
Fortinet fortios |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-09T19:31:50.964Z
Reserved: 2026-02-05T21:14:09.087Z
Link: CVE-2026-25815
Updated: 2026-02-09T19:31:38.554Z
Status : Deferred
Published: 2026-02-05T22:15:54.100
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-25815
No data.
OpenCVE Enrichment
Updated: 2026-04-17T23:00:12Z