Categories: Cyber Security News

Critical Fortinet Forticlient EMS Vulnerability Exploited in Attacks

A critical SQL injection vulnerability in Fortinet’s FortiClient Endpoint Management Server (EMS), tracked as CVE-2026-21643, is actively being exploited in the wild.

Threat actors have been leveraging this flaw in attacks starting four days ago, despite it not yet appearing on the CISA Known Exploited Vulnerabilities catalog.

The security flaw affects FortiClient EMS version 7.4.4, leaving systems vulnerable to unauthorized remote commands.

Fortinet has assigned this issue a critical CVSS score of 9.1, reflecting its severe potential impact on enterprise environments. The structured details of the vulnerability are outlined below to assist security teams with rapid threat classification.

FortiClient EMS Vulnerability Exploited

Recent Defused Cyber telemetry confirms that exploitation campaigns targeting internet-facing servers have successfully commenced.

According to Shodan data, nearly 1,000 instances of FortiClient EMS are currently publicly exposed, providing a substantial attack surface for threat actors.

In observed attacks, threat actors are bypassing security controls by smuggling malicious SQL statements through the Site header within an HTTP GET request.

https://twitter.com/DefusedCyber/status/2038266417091326156?ref_src=twsrc%5Etfw

A recorded payload targeting the /api/v1/init_consts endpoint demonstrates attackers injecting commands such as Site: x'; SELECT pg_sleep(4)--. This specific attack was observed originating from the threat actor IP address 104.192.92[.]135.

Discovered internally by Gwendal Guégniaud of Fortinet’s Product Security team, the flaw was officially disclosed on February 6, 2026.

The vulnerability stems from the improper neutralization of special elements within SQL commands in the FortiClient EMS administrative web interface. Because the software fails to properly sanitize user-supplied input, unauthenticated attackers can remotely execute arbitrary code.

Unauthenticated attackers can exploit this flaw without valid credentials, enabling them to completely compromise vulnerable endpoint management servers.

Successful exploitation allows threat actors to steal sensitive enterprise data, deploy secondary malware payloads, or move laterally across the internal network. The lack of authentication requirements makes this a highly attractive target for initial access brokers and ransomware affiliates.

Security teams must actively monitor their network traffic logs for anomalous HTTP GET requests directed at the administrative interface.

Defenders should specifically search for unexpected characters or SQL commands injected into the Site header, particularly attempts to execute time-based SQL injection functions. Identifying these specific indicators of compromise is crucial for detecting unauthorized access attempts before full exploitation occurs.

System administrators should rapidly inventory their external attack surface to identify any publicly exposed deployments running version 7.4.4. Upgrading to version 7.4.5 is the only definitive mitigation, and organizations should prioritize this update within their emergency patch management cycles. FortiClient EMS versions 7.2, 8.0, and the FortiEMS Cloud environments remain entirely unaffected by this security flaw.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Critical Fortinet Forticlient EMS Vulnerability Exploited in Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Marathon Patch 1.0.6 Update Pushes Players to Play Nice and Brings Big Changes to Shells, Weapons, and More

Bungie has been sprinkling details of its massive patch 1.0.6 update for Marathon in the…

36 minutes ago

Marathon Patch 1.0.6 Update Pushes Players to Play Nice and Brings Big Changes to Shells, Weapons, and More

Bungie has been sprinkling details of its massive patch 1.0.6 update for Marathon in the…

37 minutes ago

Man of Tomorrow Maxima Casting Confirmed

DC Studios has found its Maxima. Adria Arjona, who was on a shortlist of four…

37 minutes ago

Man of Tomorrow Maxima Casting Confirmed

DC Studios has found its Maxima. Adria Arjona, who was on a shortlist of four…

37 minutes ago

Jamie Dornan Cast in Viggo Mortensen’s Previous Role in The Lord of the Rings: The Hunt for Gollum

After re-confirming earlier this month that Viggo Mortensen would not be returning to his old…

37 minutes ago

AI Researcher Breaks Samsung TV Security, Gains Root Through Writable Drivers

This report describes how an AI-assisted researcher exploited writable driver interfaces to escalate from a…

1 hour ago

This website uses cookies.