Fortinet Patches EMS SQLi RCE
Fortinet FortiClientEMS deployments face significant risks from CVE-2026-21643, a SQL injection vulnerability that permits unauthenticated attackers to execute arbitrary code. The FortiClientEMS SQLi flaw stems from improper neutralization of special elements in SQL commands, processed through specifically crafted HTTP requests. Enterprises relying on this endpoint management solution encounter threats to system integrity, potential data confidentiality breaches, and disruptions to fleet availability, particularly in centralized management scenarios.
Vulnerability Details
Fortinet Product Security team member Gwendal Guégniaud identified the issue, classified under CWE-89 for SQL injection risks. CVSS v3.1 base score of 9.1 reflects high severity due to unauthenticated remote access without privileges. No confirmed wild exploitation noted in advisories, though rapid patching recommended given impact potential.
| CVE Identifier | Vulnerability Description | CVSS Score |
|---|---|---|
| CVE-2026-21643 | SQL injection enabling RCE | 9.1 |
Affected and Patched Versions
Specific FortiClientEMS versions carry the exposure, with clear upgrade paths outlined in vendor guidance.
| Version Series | Status | Remediation Required |
|---|---|---|
| 7.2 | Not affected | None |
| 7.4 | 7.4.4 vulnerable | Upgrade to 7.4.5 or above |
| 8.0 | Not affected | None |
Concurrent Fortinet Vulnerabilities
Fortinet advisories also cover CVE-2026-24858 (CVSS 9.4), impacting FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb. Attackers possessing FortiCloud accounts access other registered devices via SSO misconfiguration, enabling local admin account creation, VPN privilege grants, and firewall configuration exfiltration. Confirmed active exploitation underscores persistence and lateral movement risks across Fortinet ecosystems.
Product scope for CVE-2026-24858 includes:
| Product | Vulnerability Exposure |
|---|---|
| FortiOS | Yes |
| FortiManager | Yes |
| FortiAnalyzer | Yes |
| FortiProxy | Yes |
| FortiWeb | Yes |
Patching Recommendations
Immediate upgrades to FortiClientEMS 7.4.5 or later mitigate CVE-2026-21643 for affected builds. Fortinet emphasizes applying fixes promptly across management servers. No workarounds detailed; version updates fully address the SQL injection path.
The FortiClientEMS SQLi flaw, alongside exploited CVE-2026-24858, heightens operational risks to endpoint management and network perimeters. Fortinet patches restore integrity and availability, per published advisories dated recently.
No Comment! Be the first one.