VulnerabilitiesCRITICAL

Fortinet FortiClient EMS - Critical SQL Injection Under Active Attack

Featured image for Fortinet FortiClient EMS - Critical SQL Injection Under Active Attack
HNHelp Net Security+1 more
CVE-2026-21643FortinetFortiClient EMSSQL injectionBishop Foxvulnerabilitycybersecurityexploitation
🎯

There's a serious flaw in Fortinet's software that lets hackers sneak in and control systems without needing a password. They can do this by sending special messages that trick the software. This is a big deal because it can let them steal sensitive information or cause other problems. Companies using this software need to update it right away to fix the issue.

Quick Summary

Fortinet FortiClient EMS is facing active exploitation of a critical SQL injection vulnerability, CVE-2026-21643, affecting version 7.4.4. Organizations are urged to upgrade to version 7.4.5 immediately.

A critical SQL injection vulnerability (CVE-2026-21643) in Fortinet FortiClient Endpoint Management Server (EMS) is under active exploitation, with reports indicating that threat actors began leveraging this flaw just four days ago. This vulnerability, which affects FortiClient EMS version 7.4.4, allows unauthenticated attackers to execute arbitrary code by sending specially crafted HTTP requests to the administrative interface of the server. Despite not yet appearing on the CISA Known Exploited Vulnerabilities catalog, the severity of this flaw is underscored by Fortinet's assignment of a CVSS score of 9.1, indicating a critical risk to enterprise environments.

Telemetry from Defused Cyber confirms that exploitation campaigns targeting internet-facing servers have commenced, with nearly 1,000 instances of FortiClient EMS publicly exposed according to Shodan data. Attackers have been observed bypassing security controls by injecting malicious SQL statements through the Site header within an HTTP GET request. For example, a payload targeting the /api/v1/init_consts endpoint has been recorded, demonstrating the potential for attackers to execute commands such as Site: x'; SELECT pg_sleep(4)--.

The vulnerability was discovered by Gwendal Guégniaud of Fortinet’s Product Security team and stems from improper neutralization of special elements within SQL commands. This flaw allows attackers to completely compromise vulnerable endpoint management servers, steal sensitive data, deploy secondary malware, or move laterally within the network. Security teams are advised to monitor network traffic for anomalous HTTP GET requests directed at the administrative interface, particularly those containing unexpected SQL commands.

Organizations running FortiClient EMS 7.4.4 with multi-tenant mode enabled must upgrade to version 7.4.5 immediately to mitigate this risk. FortiClient EMS versions 7.2, 8.0, and FortiEMS Cloud environments are unaffected by this vulnerability.

The ongoing exploitation of CVE-2026-21643 highlights the urgent need for organizations to prioritize patch management and monitor for unusual activity on their networks. The fact that this vulnerability allows for unauthenticated access makes it particularly appealing to attackers, emphasizing the importance of securing administrative interfaces.

Original article from

HNHelp Net Security· Zeljka Zorz
Read Full Article

Also covered by

CYCyber Security News

Critical Fortinet Forticlient EMS Vulnerability Exploited in Attacks

Read Article

Related Pings

CRITICALVulnerabilities

Stored XSS Vulnerability - Critical Risk in Jira Work Management

A critical vulnerability in Jira Work Management allows low-privileged users to take over organizations. This flaw could expose sensitive data and disrupt operations. Organizations must act quickly to secure their systems.

Cyber Security News·
CRITICALVulnerabilities

Citrix NetScaler Vulnerability - Critical Flaw Exploited

Citrix's NetScaler vulnerability CVE-2026-3055 is being exploited, risking sensitive data leaks. Users must patch immediately to safeguard their systems. Don't wait for an attack!

Infosecurity Magazine·
HIGHVulnerabilities

Vim Vulnerability - Attackers Can Execute Arbitrary Commands

A serious vulnerability in Vim allows attackers to run commands on your system by opening malicious files. Most users are at risk due to default settings. Update to the latest version to protect yourself.

Cyber Security News·
HIGHVulnerabilities

LangChain Path Traversal - Critical Input Validation Flaw

A critical flaw in LangChain's input validation exposes sensitive data. Organizations using AI frameworks are at risk of data breaches. Immediate action is needed to secure enterprise information.

CSO Online·
HIGHVulnerabilities

F5 BIG-IP APM - Urgent Vulnerability Mitigation Required

A serious vulnerability in F5 BIG-IP APM requires immediate attention. UK organizations must act quickly to safeguard their systems from potential exploitation. Follow NCSC guidance to mitigate risks effectively.

NCSC UK·
CRITICALVulnerabilities

Critical n8n Vulnerability - Attackers Can Execute Code Remotely

A critical vulnerability in n8n allows attackers to execute code remotely, posing severe risks to enterprise automation environments.

Cyber Security News·