Fortinet has launched safety updates to handle a essential flaw impacting FortiClientEMS that would result in the execution of arbitrary code on vulnerable techniques.
The vulnerability, tracked as CVE-2026-21643, has a CVSS ranking of 9.1 out of a most of 10.0.
“An improper neutralization of particular parts utilized in an SQL Command (‘SQL Injection’) vulnerability [CWE-89] in FortiClientEMS could enable an unauthenticated attacker to execute unauthorized code or instructions through particularly crafted HTTP requests,” Fortinet mentioned in an advisory.
The shortcoming impacts the next variations –
- FortiClientEMS 7.2 (Not affected)
- FortiClientEMS 7.4.4 (Improve to 7.4.5 or above)
- FortiClientEMS 8.0 (Not affected)
Gwendal Guégniaud of the Fortinet Product Safety group has been credited with discovering and reporting the flaw.
Whereas Fortinet makes no point out of the vulnerability being exploited within the wild, it is important that customers transfer shortly to use the fixes.
The event comes as the corporate addressed one other essential severity flaw in FortiOS, FortiManager, FortiAnalyzer, FortiProxy, FortiWeb (CVE-2026-24858, CVSS rating: 9.4) that enables an attacker with a FortiCloud account and a registered machine to log into different units registered to different accounts, if FortiCloud SSO authentication is enabled on these units.
Fortinet has since acknowledged that the problem has been actively exploited by unhealthy actors to create native admin accounts for persistence, make configuration modifications granting VPN entry to these accounts, and exfiltrate the firewall configurations.
Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a world community of future-focused thinkers.
Unlock tomorrow’s traits immediately: learn extra, subscribe to our e-newsletter, and turn into a part of the NextTech group at NextTech-news.com

