Administrators Warned to Update FortiClientEMS After Critical Security Flaw Discovered

Fortinet has issued an urgent security advisory addressing a critical vulnerability in FortiClientEMS, its centralized management solution for endpoint protection, which could allow attackers to execute arbitrary code without authentication.

The flaw, tracked as CVE-2026-21643, has been assigned a CVSSv3 score of 9.1 out of 10. According to Fortinet, the vulnerability is an SQL Injection (SQLi) issue, formally described as an “improper neutralization of special elements used in an SQL Command” (CWE-89).

“An improper neutralization of special elements used in an SQL Command (‘SQL Injection’) vulnerability [CWE-89] in FortiClientEMS may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests,” Fortinet noted in its advisory.

The flaw affects the following versions:

  • FortiClientEMS 7.2: Not affected
  • FortiClientEMS 7.4.4: Users must upgrade to 7.4.5 or above
  • FortiClientEMS 8.0: Not affected

The vulnerability resides in the Graphical User Interface (GUI) component of the software. Insufficient input sanitization allows attackers to manipulate database queries through specially crafted HTTP requests, effectively bypassing authentication measures and gaining control over the underlying system. This poses a significant risk for enterprise environments, as FortiClientEMS typically manages endpoint security policies, antivirus deployments, and compliance reporting across an organization’s network.

Gwendal Guégniaud of the Fortinet Product Security team has been credited with discovering and reporting the flaw. While Fortinet has not confirmed any active exploitation in the wild for CVE-2026-21643, it is strongly recommended that users apply the update immediately.

This advisory follows the company’s recent disclosure of another critical-severity flaw affecting FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb (CVE-2026-24858, CVSS 9.4). That vulnerability allowed attackers with a FortiCloud account and a registered device to access other devices registered to different accounts if FortiCloud SSO authentication was enabled. Fortinet has confirmed that the issue was actively exploited to create local admin accounts, alter configurations to gain VPN access, and exfiltrate firewall configurations.

Administrators are urged to prioritize patching FortiClientEMS to prevent potential unauthorized access and mitigate risks associated with this critical SQLi vulnerability.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch