PT-2026-6694 · Fortinet · Forticlientems

Published

2026-02-06

·

Updated

2026-03-19

·

CVE-2026-21643

CVSS v2.0

10

Critical

AV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Fortinet FortiClientEMS versions 7.4.4 FortiClientEMS versions prior to 7.4.5
Description A critical SQL injection issue exists in Fortinet FortiClientEMS. This flaw allows an unauthenticated attacker to execute arbitrary code or commands by sending specially crafted HTTP requests. The vulnerability stems from improper neutralization of special elements used in SQL commands. Exploitation could lead to full administrative compromise of the EMS, unauthorized access to sensitive data, and the ability to manipulate endpoint configurations or deploy malicious software. While active exploitation of this specific vulnerability has not been officially confirmed, previous Fortinet vulnerabilities have been exploited in real-world attacks. The API endpoints are targeted, and the vulnerability lies in the improper handling of input to SQL queries. Attackers can inject malicious SQL code through HTTP requests, potentially gaining SYSTEM-level access on the EMS server. The vulnerability is rated with a CVSS score of 9.1.
Recommendations FortiClientEMS version 7.4.4: Upgrade to version 7.4.5 or a later version immediately. FortiClientEMS versions prior to 7.4.5: Upgrade to version 7.4.5 or a later version immediately.

Fix

LPE

RCE

SQL injection

Weakness Enumeration

Related Identifiers

BDU:2026-01492
CVE-2026-21643

Affected Products

Forticlientems