Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Exploitation of Fortinet FortiClient Vulnerability Begins

Exploitation of Fortinet FortiClient Vulnerability Begins

Posted on March 31, 2026 By CWS

Threat intelligence experts at Defused Cyber have reported the active exploitation of a critical vulnerability in Fortinet FortiClient EMS by threat actors. This centralized management server is crucial for organizations aiming to deploy, configure, and oversee FortiClient endpoints across diverse environments, including scenarios that require multi-tenant deployments.

Understanding the Fortinet Vulnerability

The vulnerability, identified as CVE-2026-21643, is an SQL injection flaw that can be remotely exploited without the need for authentication. This is achievable through specially crafted HTTP requests, making it a significant threat. If successfully exploited, this flaw can lead to the execution of arbitrary code or commands, as highlighted in Fortinet’s advisory.

FortiClient EMS version 7.4.4 is affected by this security defect, which was internally identified by Fortinet and addressed with a patch in version 7.4.5 released in early February. Despite this, details about the vulnerability were publicly disclosed, and subsequent technical insights were provided by cybersecurity firm Bishop Fox, emphasizing the practical nature of the exploit.

Technical Insights and Exploitation Details

Bishop Fox’s analysis revealed that attackers could exploit the /api/v1/init_consts endpoint without prior authentication, leveraging the SQL injection flaw. This endpoint’s lack of lockout protections and its tendency to return database error messages allow attackers rapid access to sensitive data in vulnerable FortiClient EMS 7.4.4 deployments.

The issue originated from changes in version 7.4.4, specifically a redesigned middleware stack and database connection layer. These changes resulted in HTTP identification headers being unsanitized before authentication, exposing the system to arbitrary SQL code execution. Consequently, attackers could access admin credentials, security policies, endpoint inventory, and certificates.

Current Status and Response

Over the recent weekend, Defused Cyber highlighted that the CVE-2026-21643 vulnerability had been actively exploited for several days, affecting approximately 1,000 FortiClient EMS deployments exposed to the internet. The Shadowserver Foundation’s tracking indicates over 2,000 such instances accessible online as of March 30.

The extent of vulnerable deployments remains unclear, and Fortinet has not yet updated their advisory to explicitly mention exploitation. SecurityWeek has reached out to Fortinet for further comments on the exploitation, promising updates upon receiving a response.

As cyber threats continue to evolve, it is imperative for organizations using FortiClient EMS to apply necessary patches and stay vigilant against potential attacks. Regular updates and adherence to security advisories can significantly mitigate risks associated with such vulnerabilities.

Security Week News Tags:Bishop Fox, CVE-2026-21643, cyber attack, cyber threat, Cybersecurity, endpoint management, FortiClient EMS, Fortinet, Fortinet patch, network security, patch update, security vulnerability, SQL injection, Threat Actors, vulnerability exploitation

Post navigation

Previous Post: Silver Fox Intensifies Asia Cyber Campaign with New Trojan
Next Post: Telegram-Based ResokerRAT Threatens Windows Security

Related Posts

Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Security Week News
Zyxel Resolves Critical Security Flaw in Multiple Devices Zyxel Resolves Critical Security Flaw in Multiple Devices Security Week News
DarkSword iOS Exploit Kit Targets Global iPhones DarkSword iOS Exploit Kit Targets Global iPhones Security Week News
New Firefox Extensions Required to Disclose Data Collection Practices New Firefox Extensions Required to Disclose Data Collection Practices Security Week News
Pierce County Library Data Breach Impacts 340,000 Pierce County Library Data Breach Impacts 340,000 Security Week News
Sophisticated Phishing Attack Targets Security Firm Executive Sophisticated Phishing Attack Targets Security Firm Executive Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Censys Secures $70M to Boost Internet Intelligence
  • Critical Flaw in WordPress Plugin Risks Data of 800,000 Sites
  • Stolen Credentials Drive Cyber Threats from Ransomware to State Attacks
  • AI Arms Race: Prioritizing Unified Exposure Management
  • Anthropic’s Claude Code Source Leak via npm Registry

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Censys Secures $70M to Boost Internet Intelligence
  • Critical Flaw in WordPress Plugin Risks Data of 800,000 Sites
  • Stolen Credentials Drive Cyber Threats from Ransomware to State Attacks
  • AI Arms Race: Prioritizing Unified Exposure Management
  • Anthropic’s Claude Code Source Leak via npm Registry

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark