[CIVN-2026-0080] Remote Code Execution Vulnerability in FortiClient EMS

By Published On: February 10, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Remote Code Execution Vulnerability in FortiClient EMS


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


FortiClient Endpoint Management Server (EMS) version 7.4.4

Overview


A remote code execution vulnerability has been reported in FortiClient Endpoint Management Server (EMS) which could allow an unauthenticated remote attacker to execute arbitrary code on the affected system.


Target Audience:

All organizations and administrators using affected FortiClientEMS deployments.


Risk Assessment:

Very high risk of remote code execution and system compromise


Impact Assessment:

Potential for execution of arbitrary code leading to complete compromise of the affected FortiClientEMS system and managed endpoints.


Description


FortiClient Endpoint Management Server (EMS) is used to centrally manage FortiClient endpoint security deployments within an organization.


A remote code execution vulnerability exists in FortiClient EMS due to improper neutralization of special elements in SQL commands. An unauthenticated remote attacker could exploit this SQL injection flaw by sending specially crafted requests to the EMS administrative interface, leading to execution of arbitrary code or commands on the affected system.


Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to execute arbitrary code with the privileges of the EMS service.


Solution


Apply appropriate updates as mentioned by the vendor:

https://fortiguard.fortinet.com/psirt/FG-IR-25-1142



Vendor Information


Fortinet Inc.

https://www.fortinet.com


References


 

https://fortiguard.fortinet.com/psirt/FG-IR-25-1142


CVE Name

CVE-2026-21643




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmLMfUACgkQ3jCgcSdc

ys8utg/+J/fs2l5AWDx9hObLl4hLVrSjtrYHWBsQym2btWk5glIO1bxTPzRSK3qx

ZlGHqiHXKvXGSMfaK0HCPBN29+Dupy/DZAj41jttMCqeias7vsKSjiUXwxK6UJaS

agqo094tJNnZ5usNZdEb8oT86gA9iuHzGefW5N/26Hv0pFRlKV1+clpX8+M2xYCD

87Bb7HBZAh2pQJJ508MoORAelr5yF5pf9Xs9ZQOzimw3YijlvUS5SdGI9Hdu35fU

+R1hCkuzGiLYL090OcPszV8vHqB2mf6Ht/9JjP0Oi7pzhQdQIyLcI6ChazlDC7xn

MCiQ60B5PLjOaVGTfaRUgDj+64bx5No0yTGO7td8AuquyL2LfDkUnox/civiefi4

icNT8Js70DY1iIGZ8RP30DqQF5dsmECQdB0Ahv8E8IJKmx9UQp00RFIlAHCtxnv4

vb6iBsL/dce5Y5W2ovnW3ZtB64or2rOfGgt8NtJ9W/87vuy9AU53WSgt5QihV1X5

dFRq3N8S2kgNGHcIRZImjvIdUpPPQwxC8IdrrvcbI6njUEIxteZRclgngJUu65mn

joKeWTM2QkcKt0bgb+7hhuoLumJhTA+S5iXfuQ56FGE6Ls3xIzjhCmZu+H4NFmhR

2M8vRZC+qjldzDeJGKE/PlIeReaxjOR7RjP38zcrjU/N8edX794=

=iRxW

—–END PGP SIGNATURE—–

Share this article