VulnerabilitiesCRITICAL

Fortinet FortiClient EMS - Critical Flaw Actively Exploited

Featured image for Fortinet FortiClient EMS - Critical Flaw Actively Exploited
BCBleepingComputer+1 more
CVE-2026-21643FortinetFortiClient EMSSQL injectionRCEActively ExploitedForticlient EMSRemote Code ExecutionVulnerabilityWarning
🎯

There's a serious security hole in Fortinet's software that lets hackers sneak in and take control of systems without needing a password. This can lead to them stealing important information or causing other damage. If you're using this software, you need to update it right away to stay safe.

Quick Summary

A critical SQL injection vulnerability in Fortinet's FortiClient EMS is actively being exploited, allowing attackers to execute arbitrary code on vulnerable systems.

Attackers are now actively exploiting a critical vulnerability in Fortinet's FortiClient EMS platform, tracked as CVE-2026-21643. This SQL injection vulnerability allows unauthenticated threat actors to execute arbitrary code or commands on unpatched systems through low-complexity attacks targeting the FortiClient EMS GUI via maliciously crafted HTTP requests. The flaw, discovered by Gwendal Guégniaud of Fortinet's Product Security team, affects FortiClient EMS version 7.4.4 and has been assigned a critical CVSS score of 9.1, indicating its severe potential impact on enterprise environments.

According to threat intelligence company Defused, exploitation campaigns targeting internet-facing servers began four days ago, despite the vulnerability not yet being listed on the CISA Known Exploited Vulnerabilities catalog. The vulnerability allows attackers to bypass security controls by smuggling malicious SQL statements through the 'Site' header within an HTTP GET request. Shodan data reveals that nearly 1,000 instances of FortiClient EMS are currently publicly exposed, creating a significant attack surface.

In observed attacks, threat actors have been seen injecting commands such as 'Site: x'; SELECT pg_sleep(4)--' into the /api/v1/init_consts endpoint, demonstrating the ease of exploitation. Successful exploitation enables attackers to steal sensitive enterprise data, deploy secondary malware payloads, or move laterally across internal networks. The lack of authentication requirements makes this flaw particularly appealing to initial access brokers and ransomware affiliates.

Security teams are urged to actively monitor network traffic logs for anomalous HTTP GET requests directed at the administrative interface, specifically looking for unexpected characters or SQL commands injected into the Site header. Identifying these indicators of compromise is crucial for detecting unauthorized access attempts before full exploitation occurs. Fortinet has advised that upgrading to version 7.4.5 is the only definitive mitigation, and organizations should prioritize this update within their emergency patch management cycles. Notably, FortiClient EMS versions 7.2, 8.0, and the FortiEMS Cloud environments remain unaffected by this security flaw.

Given the critical CVSS score of 9.1, organizations using FortiClient EMS version 7.4.4 must prioritize patching to mitigate the risk of exploitation. The vulnerability's nature allows for remote code execution without authentication, making it a prime target for attackers, especially in environments where sensitive data is managed.

Original article from

BCBleepingComputer· Sergiu Gatlan
Read Full Article

Also covered by

CYCyber Security News

Critical Fortinet Forticlient EMS Vulnerability Exploited in Attacks

Read Article

Related Pings

MEDIUMVulnerabilities

Windows Update - Microsoft Pulls KB5079391 Over Errors

Microsoft has paused the KB5079391 update due to installation errors affecting Windows 11. Users are facing error code 0x80073712. A fix is anticipated soon, but users should remain cautious.

BleepingComputer·
CRITICALVulnerabilities

F5 BIG-IP DoS Flaw Upgraded to Critical RCE Exploit Alert

A critical vulnerability in F5 BIG-IP has been exploited in the wild. This flaw allows unauthenticated attackers to execute remote code. Organizations must patch vulnerable systems immediately.

SecurityWeek·
HIGHVulnerabilities

Microsoft Issues Critical Updates for Windows Secure Boot

Microsoft has issued critical updates for Windows 11 to address Secure Boot certificate expiration. System administrators must act quickly to prevent boot failures. These updates enhance Windows Recovery and Setup functionalities, ensuring devices remain operational and secure.

Cyber Security News·
MEDIUMVulnerabilities

File Read Flaw - Vulnerability in Smart Slider Plugin

A vulnerability in the Smart Slider 3 plugin threatens over 500,000 WordPress sites, allowing unauthorized file access. Site owners must update their plugins immediately to mitigate risks.

BleepingComputer·
HIGHVulnerabilities

Safari 26.4 - Critical Vulnerabilities Addressed

Apple has released Safari 26.4 to fix serious vulnerabilities in WebKit. This update is crucial for macOS users to protect against potential exploits. Make sure to update your software for enhanced security.

Full Disclosure·
HIGHVulnerabilities

Xcode 26.4 - Critical Security Update Released

Apple has rolled out Xcode 26.4 to fix serious vulnerabilities in macOS Tahoe. Developers should update immediately to prevent system crashes and unauthorized file access. Stay secure and keep your tools up to date!

Full Disclosure·