
[CIVN-2026-0080] Remote Code Execution Vulnerability in FortiClient EMS
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in FortiClient EMS
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
FortiClient Endpoint Management Server (EMS) version 7.4.4
Overview
A remote code execution vulnerability has been reported in FortiClient Endpoint Management Server (EMS) which could allow an unauthenticated remote attacker to execute arbitrary code on the affected system.
Target Audience:
All organizations and administrators using affected FortiClientEMS deployments.
Risk Assessment:
Very high risk of remote code execution and system compromise
Impact Assessment:
Potential for execution of arbitrary code leading to complete compromise of the affected FortiClientEMS system and managed endpoints.
Description
FortiClient Endpoint Management Server (EMS) is used to centrally manage FortiClient endpoint security deployments within an organization.
A remote code execution vulnerability exists in FortiClient EMS due to improper neutralization of special elements in SQL commands. An unauthenticated remote attacker could exploit this SQL injection flaw by sending specially crafted requests to the EMS administrative interface, leading to execution of arbitrary code or commands on the affected system.
Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to execute arbitrary code with the privileges of the EMS service.
Solution
Apply appropriate updates as mentioned by the vendor:
https://fortiguard.fortinet.com/psirt/FG-IR-25-1142
Vendor Information
Fortinet Inc.
https://www.fortinet.com
References
https://fortiguard.fortinet.com/psirt/FG-IR-25-1142
CVE Name
CVE-2026-21643
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmLMfUACgkQ3jCgcSdc
ys8utg/+J/fs2l5AWDx9hObLl4hLVrSjtrYHWBsQym2btWk5glIO1bxTPzRSK3qx
ZlGHqiHXKvXGSMfaK0HCPBN29+Dupy/DZAj41jttMCqeias7vsKSjiUXwxK6UJaS
agqo094tJNnZ5usNZdEb8oT86gA9iuHzGefW5N/26Hv0pFRlKV1+clpX8+M2xYCD
87Bb7HBZAh2pQJJ508MoORAelr5yF5pf9Xs9ZQOzimw3YijlvUS5SdGI9Hdu35fU
+R1hCkuzGiLYL090OcPszV8vHqB2mf6Ht/9JjP0Oi7pzhQdQIyLcI6ChazlDC7xn
MCiQ60B5PLjOaVGTfaRUgDj+64bx5No0yTGO7td8AuquyL2LfDkUnox/civiefi4
icNT8Js70DY1iIGZ8RP30DqQF5dsmECQdB0Ahv8E8IJKmx9UQp00RFIlAHCtxnv4
vb6iBsL/dce5Y5W2ovnW3ZtB64or2rOfGgt8NtJ9W/87vuy9AU53WSgt5QihV1X5
dFRq3N8S2kgNGHcIRZImjvIdUpPPQwxC8IdrrvcbI6njUEIxteZRclgngJUu65mn
joKeWTM2QkcKt0bgb+7hhuoLumJhTA+S5iXfuQ56FGE6Ls3xIzjhCmZu+H4NFmhR
2M8vRZC+qjldzDeJGKE/PlIeReaxjOR7RjP38zcrjU/N8edX794=
=iRxW
—–END PGP SIGNATURE—–


