I did some more digging on this. I’ve got 2 different customers running SSL VPN using SAML auth to Entra ID only. Within the past couple days, I’ve been alerted to login failures and account lockouts at both customers. DC logs are showing the audit failures coming from the FW’s internal IPs. Most of the SSL-LOGIN-FAIL events on the FW are from obvious bot names like admin, administrator, john, sean, copier, etc and are not hitting the DCs, but there are over 180k audit failures in the last couple of days.
It seems even though LDAP is not configured for use with the SSL VPN anymore, it’s still using it to send requests. Removing the LDAP config instantly stopped the audit failures on the DCs.
I suspect this may be a vulnerability that is being exploited.