You are currently viewing FortiClient EMS Under Fire: Critical CVE-2026-21643 Exploited in Real-World Attacks

FortiClient EMS Under Fire: Critical CVE-2026-21643 Exploited in Real-World Attacks

  • Post author:
  • Reading time:3 mins read

A critical SQL injection vulnerability, CVE-2026-21643, has been identified in FortiClient Endpoint Management Server (EMS), a centralized management platform for FortiClient endpoint agents across multiple environments.

The vulnerability is currently under active exploitation in the wild, even though it is not yet listed in major exploited vulnerability catalogs. Early attack activity indicates that threat actors are already targeting exposed systems.

This issue poses a serious risk to organizations that have their FortiClient EMS administrative interface accessible over the internet, as it allows remote compromise without authentication.

Vulnerability Details:

  • CVE-IDCVE-2026-21643
  • CVSS Score: 9.8 (Critical) 
  • EPSS Score: 0.05%
  • Vulnerability: SQL Injection vulnerability 
  • Affected Product: Fortinet FortiClientEMS

Root Cause

CVE-2026-21643 is caused by improper neutralization of special elements in SQL commands, resulting in a SQL injection vulnerability.

The flaw was introduced in FortiClient EMS during changes to the middleware and database connection layer to support enhanced multi-tenant functionality.

Specifically, an HTTP header used to identify tenant context is passed directly into a backend SQL query without proper sanitization, and this occurs before authentication is enforced.

Impact

This vulnerability allows remote, unauthenticated attackers to:

  • Execute arbitrary SQL queries on the backend PostgreSQL database
  • Access highly sensitive information, including:
    • Administrative credentials
    • Endpoint inventory data
    • Security policies
    • Certificates for managed endpoints
  • Potentially execute unauthorized commands or code on the server

Due to the absence of authentication requirements and the sensitivity of exposed data, the impact is considered critical.

Infection Method / Exploitation Technique

The exploitation process is simple and highly effective:

  1. The attacker connects to the FortiClient EMS web interface over HTTPS
  2. A specially crafted HTTP request is sent to the server
  3. The request contains a malicious tenant-identification HTTP header
  4. This header is directly incorporated into a SQL query without validation
  5. The injected SQL is executed by the database

Affected Products

VersionAffectedSolution
FortiClientEMS 8.0Not affectedNot Applicable
FortiClientEMS 7.47.4.4Upgrade to 7.4.5 or above
FortiClientEMS 7.2Not affectedNot Applicable

Mitigation & Recommendations

To reduce the risk of exploitation of CVE-2026-21643 in Fortinet FortiClient EMS, organizations should take immediate action:

  • Update FortiClient EMS from version 7.4.4 to 7.4.5 or later, where the vulnerability has been fixed.
  • Limit exposure of the EMS administrative interface by:
    • Removing public internet access
    • Allowing access only via VPN or trusted internal networks

Instantly Fix Risks with Saner Patch Management

Saner patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.

It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. Saner patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.

Experience the fastest and most accurate patching software here.