Fortinet Vulnerability - Critical SQL Injection Exploited

Basically, hackers found a way to break into Fortinet's system without a password.
Fortinet is under siege as a critical SQL injection vulnerability is actively exploited. Thousands of systems are at risk, allowing attackers to access sensitive data. Immediate patching is essential to safeguard against this threat.
What Happened
Fortinet has been hit again by a critical security flaw, this time involving a SQL injection vulnerability in its FortiClient Endpoint Management Server (EMS). This vulnerability, identified as CVE-2026-21643, allows unauthenticated attackers to execute arbitrary code on unpatched systems through specially-crafted HTTP requests. The flaw was discovered by Fortinet's security team and has been actively exploited, with reports indicating that it was being abused just days ago.
The vulnerability affects FortiClient EMS version 7.4.4 when multi-tenant mode is enabled, leaving thousands of internet-facing systems at risk. Security experts emphasize the urgency of patching this flaw by upgrading to version 7.4.5 or later to prevent potential exploitation.
Who's Affected
The impact of this vulnerability is extensive, as Fortinet serves over 900,000 customers worldwide. The Shadowserver Foundation has reported tracking more than 2,400 FortiClient EMS instances exposed to the internet, primarily in the U.S. and Europe. Additionally, Shodan has identified around 1,000 publicly-exposed instances of FortiClient EMS.
Organizations using FortiClient EMS are particularly vulnerable, especially those that have not implemented the necessary security measures. The lack of lockout protections and the ability to execute arbitrary SQL commands make these systems prime targets for attackers.
What Data Was Exposed
Exploitation of this vulnerability can lead to severe consequences, including unauthorized access to admin credentials, endpoint inventory data, security policies, and certificates for managed endpoints. Attackers can execute commands without needing any credentials, which significantly lowers the barrier for entry.
The nature of SQL injection attacks means that a single crafted HTTP request can lead to data exfiltration and remote code execution. This situation is exacerbated by the fact that many existing security controls fail to detect such flaws, allowing attackers to move laterally within the network and extract sensitive information.
What You Should Do
Organizations must take immediate action to protect their systems. Here are some recommended steps:
- Patch FortiClient EMS to version 7.4.5 or later to close the vulnerability.
- Inspect HTTP traffic logs for any anomalous SQL syntax that may indicate an ongoing attack.
- Remove direct internet exposure of FortiClient EMS and place it behind a secure access gateway.
- Implement a zero-trust architecture to minimize the risk of unauthorized access.
Fortinet's ongoing vulnerabilities highlight the need for more proactive security measures. As attackers continue to exploit weaknesses, organizations must remain vigilant and responsive to emerging threats.