Authentication Lockout Bypass via Race Condition
A race condition in FortiAnalyzer and FortiManager versions 6.4, 7.0, 7.2, 7.4, and 7.6.0–7.6.4 allows authentication lockout protection to be bypassed for a brief window. An attacker can exploit this by sending concurrent authentication requests, permitting additional password guesses before the account lockout is enforced. The vulnerability affects both on-premises and cloud deployments. Fortinet has released patches for version 7.6.5 and later; older versions (6.4–7.4) require migration to a fixed release.
- Network access to FortiAnalyzer or FortiManager management interface (port 443)
- Valid username (attacker can attempt dictionary/common credentials)
- Ability to send rapid concurrent requests (automated tooling)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a7c5e41b-9860-4cf0-b267-e4926cd441feGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.