Particle.news

Critical FortiClient EMS SQL Injection Reported Under Active Exploit

Wide internet exposure makes rapid upgrades to 7.4.5 critical for defenders.

Overview

  • Defused, which runs honeypots, reported Sunday that attackers began exploiting CVE-2026-21643 about four days earlier.
  • The flaw lets an unauthenticated request inject SQL through the 'Site' HTTP header in the FortiClient EMS web interface, enabling remote code or command execution.
  • The bug affects FortiClient EMS 7.4.4, and Fortinet advises upgrading to 7.4.5 or later, while branches 7.2 and 8.0 are not impacted.
  • Internet scans show many EMS consoles open to the web, with Shadowserver tracking roughly 2,000 instances and Shodan close to 1,000, largely in the U.S. and Europe.
  • Fortinet discovered the issue internally and has not confirmed in-the-wild attacks, and prior Fortinet flaws have fueled ransomware and espionage, raising the stakes for unpatched networks.