CVE-2026-21643
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。我得先仔细阅读文章内容。 文章主要讲的是Fortinet FortiClient EMS存在一个严重的SQL注入漏洞,编号是CVE-2026-21643。这个漏洞可以让未经认证的攻击者通过精心构造的HTTP请求执行未授权的代码或命令。影响版本是7.4.4,CVSS评分9.8,已经被野利用了。 接下来,用户可能需要一个简洁明了的总结,用于快速了解问题。我得确保包含关键点:漏洞名称、影响版本、CVSS评分、攻击类型和建议措施。 还要注意字数限制,所以要精炼语言。比如,“严重SQL注入漏洞”、“未经认证”、“CVSS评分9.8”、“建议升级到7.4.5或以上”。 最后,检查是否符合用户的要求,没有使用“文章内容总结”之类的开头,直接描述即可。 </think> Fortinet FortiClient EMS 存在严重 SQL 注入漏洞(CVE-2026-21643),影响 7.4.4 版本,CVSS 评分 9.8。攻击者可通过构造 HTTP 请求执行未授权代码或命令。建议升级至 7.4.5 或以上版本,并限制访问以降低风险。 2026-4-15 12:0:0 Author: horizon3.ai(查看原文) 阅读量:24 收藏

Fortinet FortiClient EMS SQL Injection Vulnerability

Fortinet FortiClient EMS contains a critical SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. The vulnerability affects FortiClient EMS 7.4.4, carries a CVSS v3.1 score of 9.8, and Fortinet says it has been observed to be exploited in the wild. 

Technical Details

CVE-2026-21643 is a CWE-89 SQL injection vulnerability in the FortiClient EMS administrative interface. Fortinet states that the flaw may allow an unauthenticated attacker to execute unauthorized code or commands through specifically crafted HTTP requests. Fortinet lists the issue as Critical, identifies the component as the GUI, and says the attack type is unauthenticated. The affected version in the 7.4 branch is 7.4.4. FortiClient EMS 7.2 and 8.0 are listed as not affected.

This matters because FortiClient EMS is a centralized endpoint management platform. A successful compromise of that management layer can create a high-impact foothold for an attacker. The vendor advisory supports the clearest public claim here: the vulnerability can lead to unauthorized code or command execution on the EMS server. Public reporting on March 30, 2026 said attackers had already begun exploiting the flaw in the wild.

Stop Guessing, Start Proving

NodeZero® Proactive Security Platform — Rapid Response

When a critical advisory drops, the first question is simple: does this actually expose my environment?

NodeZero Rapid Response helps answer that directly by safely validating exploitability on-demand.

  • Run the Rapid Response test: Horizon3.ai customers can launch the test from the portal to determine whether FortiClient EMS is exploitable in their environment.
  • Patch immediately: Fortinet says customers running FortiClient EMS 7.4.4 should upgrade to 7.4.5 or above.
  • Restrict access while patching: If patching cannot happen immediately, restrict access to the EMS administrative interface and related services to trusted hosts and networks only. 
  • Re-run the Rapid Response test: After patching or restricting access, re-test to confirm the exposure has been removed.

Indicators of Compromise

Fortinet’s advisory for CVE-2026-21643 does not provide a dedicated IOC section with attacker IPs, hashes, filenames, or command strings. Public reporting confirms exploitation activity, but the vendor advisory does not publish concrete hunting artifacts for this CVE. Because of that, this section should either remain omitted or stay minimal rather than inventing indicators that are not in the source material.

Affected versions & patch

  • Affected: FortiClient EMS 7.4.4.
  • Not affected: FortiClient EMS 7.2 and 8.0.
  • Patch: Upgrade to FortiClient EMS 7.4.5 or above.

Timeline

  • February 6, 2026 – Fortinet published advisory FG-IR-25-1142.
  • March 30, 2026 – BleepingComputer reported active exploitation, citing Defused.
  • April 13, 2026 – CISA’s advisories page shows an alert titled “CISA Adds Seven Known Exploited Vulnerabilities to Catalog,” and secondary reporting states CVE-2026-21643 was among the additions.

References

Read about other CVEs

NodeZero® Platform

Implement a continuous find, fix, and verify loop with NodeZero

The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.

Explore NodeZero

Recognized By


文章来源: https://horizon3.ai/attack-research/vulnerabilities/cve-2026-21643/
如有侵权请联系:admin#unsafe.sh