Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Updates Fix Major SQL Injection Vulnerability

Fortinet Updates Fix Major SQL Injection Vulnerability

Posted on February 10, 2026 By CWS

Fortinet has released vital security updates to rectify a serious vulnerability in FortiClientEMS that might allow unauthorized execution of code on affected systems. The flaw, identified as CVE-2026-21643, has been assigned a CVSS score of 9.1, indicating its critical nature.

Understanding the SQL Injection Flaw

This vulnerability arises from improper neutralization of special elements within an SQL command, commonly known as SQL injection, categorized under CWE-89. This flaw could potentially allow an unauthenticated attacker to run unauthorized code or commands by sending specially designed HTTP requests, according to Fortinet’s advisory.

Affected Software Versions

The vulnerability impacts specific versions of FortiClientEMS. Versions 7.4.4 require an upgrade to version 7.4.5 or higher to mitigate the threat. Versions 7.2 and 8.0 are not affected. The flaw was discovered by Gwendal Guégniaud from Fortinet’s Product Security team.

Immediate Action Recommended

Although there is no evidence of exploitation in the wild, Fortinet emphasizes the urgency for users to apply the released updates to safeguard their systems. Ignoring these updates could leave systems vulnerable to potential attacks exploiting the flaw.

Recently, Fortinet addressed another critical vulnerability in its FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb products. This flaw, identified as CVE-2026-24858 with a CVSS score of 9.4, allowed attackers with access to FortiCloud accounts to log into other registered devices if FortiCloud SSO authentication was enabled.

Exploitation and Mitigation

Fortinet acknowledged that the latter vulnerability has been actively exploited by malicious actors. Attackers used this access to create local admin accounts, alter configurations to grant VPN access, and extract firewall configurations. This underscores the importance of promptly applying security patches to prevent similar breaches.

In conclusion, maintaining updated security measures is crucial to protect against such vulnerabilities. Fortinet’s prompt action in releasing these updates highlights the importance of staying vigilant and proactive in cybersecurity practices.

The Hacker News Tags:CVE-2026-21643, Cybersecurity, FortiClientEMS, FortiManager, Fortinet, FortiOS, network security, security updates, SQL injection, vulnerability patch

Post navigation

Previous Post: Revolutionary Open-source LLM Vulnerability Scanner Launched
Next Post: Chinese Cyber Espionage Targets Singapore Telecom Industry

Related Posts

Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks The Hacker News
RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks The Hacker News
Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs The Hacker News
CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Security Patches Released by Over 60 Software Vendors
  • GitGuardian Secures $50M to Enhance AI and Security Solutions
  • GitGuardian Secures $50M to Enhance AI Identity Security
  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Security Patches Released by Over 60 Software Vendors
  • GitGuardian Secures $50M to Enhance AI and Security Solutions
  • GitGuardian Secures $50M to Enhance AI Identity Security
  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark