Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

Published: (February 9, 2026 at 11:38 PM EST)
2 min read

Source: The Hacker News

Fortinet security update

Vulnerability Details

Fortinet has released security updates to address a critical flaw in FortiClientEMS that could allow unauthenticated code execution on affected systems.

  • CVE: CVE‑2026‑21643
  • CVSS: 9.1 (Critical)

“An improper neutralization of special elements used in an SQL Command (‘SQL Injection’) vulnerability (CWE‑89) in FortiClientEMS may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.” – Fortinet advisory [link]

Affected Versions

  • FortiClientEMS 7.2 – Not affected
  • FortiClientEMS 7.4.4 – Upgrade to 7.4.5 or later
  • FortiClientEMS 8.0 – Not affected

The flaw was discovered and reported by Gwendal Guégniaud of the Fortinet Product Security team.

Additional Context

Fortinet also recently addressed another critical‑severity vulnerability affecting FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb (CVE‑2026‑24858, CVSS 9.4). This issue allowed an attacker with a FortiCloud account and a registered device to log into other devices linked to different accounts when FortiCloud SSO authentication was enabled. The company has confirmed active exploitation, including the creation of local admin accounts, configuration changes granting VPN access, and exfiltration of firewall configurations.

Reference: Fortinet patches CVE‑2026‑24858


Tags: cybersecurity, firewall, Fortinet, network security, remote code execution, sql injection, threat intelligence, vulnerability

0 views
Back to Blog

Related posts

Read more »