Fortinet Patches Critical SQLi-to-RCE Flaw in FortiClientEMS
CVE-2026-21643 allows unauthenticated attackers to chain SQL injection with command execution in FortiClient EMS. CVSS 9.8 affects version 7.4.4—upgrade to 7.4.5 immediately.
Fortinet released a critical patch for FortiClient EMS, fixing a SQL injection vulnerability that attackers can chain with command execution to fully compromise systems without authentication. CVE-2026-21643 carries a CVSS score of 9.8—one of the most severe vulnerabilities disclosed in Fortinet products this year.
FortiClient EMS is the endpoint management server that organizations use to deploy, configure, and monitor FortiClient installations across their networks. Compromising it gives attackers a foothold in security infrastructure with visibility into—and potentially control over—managed endpoints.
Vulnerability Details
The flaw exists in FortiClientEMS's web interface and stems from improper neutralization of special elements in SQL commands. An unauthenticated remote attacker can send specially crafted requests to the web GUI that execute arbitrary SQL queries against the backend database.
But the vulnerability goes beyond data theft. Arctic Wolf's analysis confirmed that attackers can chain the SQL injection with command execution capabilities, transforming a database vulnerability into full system compromise. Successful exploitation allows:
- Creating or modifying administrative accounts
- Injecting malicious payloads
- Executing arbitrary commands on the host operating system
- Establishing persistent access for follow-on attacks
This attack pattern—SQLi chaining to RCE—isn't new, but it's particularly dangerous in management software where the compromised system has legitimate access to other resources.
Affected Versions
Fortinet's advisory confirms FortiClient EMS 7.4.4 is vulnerable. The fix ships in version 7.4.5 and later. Versions 7.2 and 8.0 are not affected.
Organizations running the vulnerable version should upgrade immediately. SOC Prime's coverage notes no active exploitation has been detected yet, but that status typically changes quickly once technical details circulate.
Fortinet's Recurring Challenges
This isn't Fortinet's first critical vulnerability in recent months. We've tracked multiple high-severity flaws in Fortinet products including the FortiGate authentication bypass that attackers exploited before patches were available, and the Brutus brute-force tool circulating on dark web forums that specifically targets Fortinet infrastructure.
Fortinet devices sit at network perimeters—exactly where attackers focus exploitation efforts. A compromised FortiGate firewall or FortiClientEMS server provides initial access into otherwise protected networks. State-sponsored groups and ransomware operators both prioritize these targets.
Mitigation Steps
- Upgrade to FortiClient EMS 7.4.5 or later immediately
- Restrict access to the EMS web interface to trusted administrative networks only—don't expose it to the internet
- Review EMS logs for unusual authentication attempts or database queries
- Audit administrative accounts for unauthorized additions or modifications
- Monitor downstream FortiClient deployments for policy changes or suspicious activity
If you can't patch immediately, network segmentation provides partial mitigation. Limiting which systems can reach the EMS web interface reduces the attack surface, though it doesn't eliminate the vulnerability.
Timeline Pressure
The typical window between vulnerability disclosure and active exploitation has compressed dramatically. APT28 weaponized the Microsoft Office zero-day within 72 hours of Microsoft's January disclosure. CISA's KEV catalog updates increasingly include vulnerabilities with confirmed pre-disclosure exploitation.
For critical infrastructure software like FortiClient EMS, assume threat actors are already analyzing the patch to develop exploits. Organizations with exposed instances face the highest risk. Those with proper network segmentation have more time, but still need to prioritize patching.
FortiClient EMS 7.4.5 is available now. The question isn't whether to patch—it's how quickly you can schedule the upgrade.
Related Articles
FortiSIEM RCE Flaw Lets Attackers Gain Root Without Auth
CVE-2025-64155 in Fortinet's SIEM product enables unauthenticated command injection via phMonitor service. CVSS 9.4, patches now available.
Jan 14, 2026SmarterMail CVE-2025-52691 Scores Perfect 10.0 CVSS for Unauthenticated RCE
Singapore's CSA warns of a critical SmarterMail vulnerability allowing remote code execution through file upload without authentication. Patch immediately.
Dec 31, 2025Serv-U Type Confusion Bug Enables Privileged Code Execution
CVE-2025-40540 is a critical type confusion vulnerability in SolarWinds Serv-U with CVSS 9.1. Attackers with admin access can execute arbitrary code.
Feb 24, 2026n8n Sandbox Escape CVE-2026-25049 Bypasses Prior Fix
New n8n RCE flaw bypasses December patch through type confusion. CVSS 9.4 vulnerability enables unauthenticated command execution via malicious workflows.
Feb 15, 2026