A Improper Access Control in Fortinet FortiOS 6.0.2, 5.6.7 and before, FortiADC 6.1.0, 6.0.0 to 6.0.1, 5.4.0 to 5.4.4 allows attacker to obtain the LDAP server login credentials configured in FortiGate via pointing a LDAP server connectivity test request to a rogue LDAP server instead of the configured one.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 22 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Thu, 24 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:fortinet:fortiadc:6.0.1:*:*:*:*:*:*:* | 
Wed, 23 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | kev 
 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: fortinet
Published: 2019-01-22T14:00:00.000Z
Updated: 2025-10-21T23:45:44.273Z
Reserved: 2018-07-06T00:00:00.000Z
Link: CVE-2018-13374
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-05T09:00:35.217Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2019-01-22T14:29:00.220
Modified: 2025-10-24T12:53:15.020
Link: CVE-2018-13374
 Redhat
                        Redhat
                    No data.