A Improper Access Control in Fortinet FortiOS 6.0.2, 5.6.7 and before, FortiADC 6.1.0, 6.0.0 to 6.0.1, 5.4.0 to 5.4.4 allows attacker to obtain the LDAP server login credentials configured in FortiGate via pointing a LDAP server connectivity test request to a rogue LDAP server instead of the configured one.
References
| Link | Resource |
|---|---|
| https://fortiguard.com/advisory/FG-IR-18-157 | Vendor Advisory |
| https://fortiguard.com/advisory/FG-IR-18-157 | Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-13374 |
Configurations
Configuration 1 (hide)
|
History
22 Oct 2025, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2019-01-22 14:29
Updated : 2025-10-22 00:16
NVD link : CVE-2018-13374
Mitre link : CVE-2018-13374
CVE.ORG link : CVE-2018-13374
JSON object : View
Products Affected
fortinet
- fortios
- fortiadc
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
