Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026 (by default, the encryption key is the same across all customers' installations). NOTE: the Supplier's position is that the instance of CWE-1394 is not a vulnerability because customers "are supposed to enable" a non-default option that eliminates the weakness. However, that non-default option can disrupt functionality as shown in the "Managing FortiGates with private data encryption" document, and is therefore intentionally not a default option.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026 (by default, the encryption key is the same across all customers' installations). NOTE: the Supplier's position is that the instance of CWE-1394 is not a vulnerability because customers "are supposed to enable" a non-default option that eliminates the weakness. However, that non-default option can disrupt functionality as shown in the "Managing FortiGates with private data encryption" document, and is therefore intentionally not a default option. | |
| First Time appeared |
Fortinet
Fortinet fortios |
|
| Weaknesses | CWE-1394 | |
| CPEs | cpe:2.3:a:fortinet:fortios:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fortinet
Fortinet fortios |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-05T21:14:49.977Z
Reserved: 2026-02-05T21:14:09.087Z
Link: CVE-2026-25815
No data.
Status : Received
Published: 2026-02-05T22:15:54.100
Modified: 2026-02-05T22:15:54.100
Link: CVE-2026-25815
No data.
OpenCVE Enrichment
No data.