A critical security vulnerability has been discovered in Fortinet’s FortiClient Endpoint Management Server (EMS), tracked as CVE-2026-21643. The flaw allows unauthenticated attackers to execute arbitrary SQL queries on the backend database, potentially exposing sensitive organizational data. With a high severity rating, this issue is particularly dangerous for enterprises that have exposed EMS instances to the internet, as attackers can exploit it remotely without needing valid login credentials. The root cause of the vulnerability lies in improper input validation within the application’s middleware layer, specifically in how it processes the HTTP Site header. This user-controlled input is directly incorporated into PostgreSQL queries without adequate sanitization, leading to a classic SQL injection scenario. The issue is further exacerbated in multi-tenant deployments, where the vulnerable component is triggered before authentication checks. Attackers can exploit publicly accessible API endpoints to inject malicious SQL commands, potentially gaining unauthorized access to database contents or modifying them. To mitigate this risk, organizations should immediately upgrade to FortiClient EMS version 7.4.5 or later, where the vulnerability has been patched. Additionally, restricting access to EMS interfaces through firewalls or VPNs can significantly reduce exposure. Disabling multi-tenant mode where not required, implementing strict input validation mechanisms, and continuously monitoring logs for suspicious activity are also recommended to strengthen overall security posture.
Cisco firewall appliances are actively being targeted through critical zero-day vulnerabilities that enable unauthenticated attackers to gain full control over affected systems. Th...
The ransomware group LeakNet is expanding operations by developing its own infection and execution infrastructure, reducing reliance on initial access brokers. key innovation in it...
Security researchers have identified a malicious campaign targeting developers through a compromised extension distributed via the Open VSX Registry. Disguised as a GitHub download...