SQL Injection Vulnerability in Fortinet FortiClientEMS Product
CVE-2026-21643
Key Information:
- Vendor
Fortinet
- Status
- Vendor
- CVE Published:
- 6 February 2026
Badges
What is CVE-2026-21643?
CVE-2026-21643 is a significant SQL injection vulnerability found in Fortinet's FortiClientEMS product version 7.4.4. FortiClientEMS is a management solution that provides endpoint security, allowing organizations to manage and monitor their endpoints effectively, ensuring they are secure against various threats. The vulnerability arises from an improper handling of special elements within SQL commands, which can be exploited by an unauthenticated attacker. This flaw allows the attacker to execute unauthorized SQL commands through specially crafted HTTP requests, leading to potential compromise of the database and associated sensitive information. The consequence of such exploitation can severely undermine the integrity and confidentiality of the organization's data and systems.
Potential impact of CVE-2026-21643
-
Unauthorized Code Execution: The vulnerability enables attackers to execute arbitrary SQL commands without authentication, which can lead to full control over the database or even the server environment. This can result in unauthorized access to sensitive data, or manipulation and deletion of critical records.
-
Data Breach Risks: Exploiting this vulnerability could expose confidential information stored within the managed endpoints, including personal and financial data, intellectual property, and more. This could lead to significant legal and reputational ramifications for organizations affected by data breaches.
-
Increased Attack Surface: As this SQL injection vulnerability can be exploited remotely and without authentication, it presents a low-barrier entry point for malicious actors. Successful exploitation may facilitate further attacks, allowing threat actors to escalate privileges or deploy additional malware, posing a long-term risk to the organization's cybersecurity posture.
Affected Version(s)
FortiClientEMS 7.4.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π
Vulnerability started trending
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved