Malicious code can slip through FortiClient EMS vulnerability

An important update closes a critical security vulnerability in FortiClient Endpoint Management Server (EMS).

listen Print view
A symbolic sign with an update reminder.

(Image: Artur Szczybylo / Shutterstock.com)

1 min. read

Admins managing computers in companies with FortiClient Endpoint Management Server (EMS) should update the application promptly for security reasons. A vulnerability in a specific version can allow malicious code onto systems.

In a security advisory, the developers point out that only FortiClient EMS 7.4.4 is affected by the “critical” security vulnerability (CVE-2026-21643). Versions 7.2 and 8.0 are not impacted by the vulnerability. The developers assure that the security issue has been resolved starting with version 7.4.5.

Because SQL commands are not sufficiently sanitized, attackers can exploit the vulnerability with crafted HTTP requests without authentication and execute their code. Due to the severity of the vulnerability, it is assumed that PCs will be fully compromised afterward. So far, FortiGuard has no indications of ongoing attacks. It remains unclear how admins can identify already attacked PCs.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.