Fortinet FortiClient EMS contains a critical SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. The vulnerability affects FortiClient EMS 7.4.4, carries a CVSS v3.1 score of 9.8, and Fortinet says it has been observed to be exploited in the wild.
CVE-2026-21643 is a CWE-89 SQL injection vulnerability in the FortiClient EMS administrative interface. Fortinet states that the flaw may allow an unauthenticated attacker to execute unauthorized code or commands through specifically crafted HTTP requests. Fortinet lists the issue as Critical, identifies the component as the GUI, and says the attack type is unauthenticated. The affected version in the 7.4 branch is 7.4.4. FortiClient EMS 7.2 and 8.0 are listed as not affected.
This matters because FortiClient EMS is a centralized endpoint management platform. A successful compromise of that management layer can create a high-impact foothold for an attacker. The vendor advisory supports the clearest public claim here: the vulnerability can lead to unauthorized code or command execution on the EMS server. Public reporting on March 30, 2026 said attackers had already begun exploiting the flaw in the wild.
When a critical advisory drops, the first question is simple: does this actually expose my environment?
NodeZero Rapid Response helps answer that directly by safely validating exploitability on-demand.
Fortinet’s advisory for CVE-2026-21643 does not provide a dedicated IOC section with attacker IPs, hashes, filenames, or command strings. Public reporting confirms exploitation activity, but the vendor advisory does not publish concrete hunting artifacts for this CVE. Because of that, this section should either remain omitted or stay minimal rather than inventing indicators that are not in the source material.
The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.