CVE-2026-21643

Fortinet · FortiClientEMS

An unauthenticated SQL injection vulnerability in Fortinet FortiClientEMS 7.4.4 allows for unauthorized code or command execution via crafted HTTP requests.

Executive summary

A critical SQL injection vulnerability in Fortinet FortiClientEMS allows an unauthenticated remote attacker to execute arbitrary commands and compromise the management server.

Vulnerability

The flaw stems from the improper neutralization of special elements within SQL commands. By sending specifically crafted HTTP requests to the EMS server, an unauthenticated attacker can manipulate database queries to execute unauthorized code or system-level commands.

Business impact

Successful exploitation grants an attacker full control over the FortiClientEMS server, which manages endpoint security across the entire enterprise. This could lead to the deployment of malware to endpoints, theft of sensitive credentials, or total disruption of security operations. The CVSS score of 9.8 reflects the critical risk to the organization's security posture.

Remediation

Immediate Action: Update Fortinet FortiClientEMS to the latest patched version (refer to Fortinet advisory for version 7.4.5 or higher) immediately.

Proactive Monitoring: Inspect web server and database logs for common SQL injection patterns, such as unexpected single quotes or UNION SELECT statements in HTTP parameters.

Compensating Controls: Deploy a Web Application Firewall (WAF) with SQL injection protection rules to filter malicious traffic targeting the FortiClientEMS management interface.

Exploitation status

Public Exploit Available: No

Analyst recommendation

This vulnerability represents a significant threat to the centralized security management of an organization. Because it is unauthenticated and leads to remote code execution, it must be treated with the highest urgency. We recommend applying the vendor's patch within 24 hours to mitigate the risk of a full-scale network compromise.