Fortinet VPN Flaw: When Success Hides in Failed Logins
Researchers found a Fortinet VPN design flaw that logs only failed login attempts, creating a false sense of security during brute-force attacks. This allows attackers to verify VPN credentials without detection. Despite the risk, Fortinet doesn’t view this as a vulnerability, leaving admins blissfully unaware of successful breaches.

Hot Take:
Well, isn’t this just a classic case of “I see nothing, I know nothing!” Fortinet’s VPN server is playing peekaboo with hackers, letting them in while pretending nothing happened. It’s like a bouncer who only records the people who didn’t get in—talk about selective memory!
Key Points:
- Fortinet VPN server’s logging flaw allows hiding successful brute-force attacks.
- Log records failed attempts but skips the successful credential verification.
- Pentera researchers exposed this flaw using the Burp security testing tool.
- Fortinet does not recognize this flaw as a vulnerability yet.
- Pentera released a script exploiting the design flaw for credential verification.
Already a member? Log in here
