Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Exploitation of Fortinet FortiClient Vulnerability Begins

Exploitation of Fortinet FortiClient Vulnerability Begins

Posted on March 31, 2026 By CWS

Threat intelligence experts at Defused Cyber have reported the active exploitation of a critical vulnerability in Fortinet FortiClient EMS by threat actors. This centralized management server is crucial for organizations aiming to deploy, configure, and oversee FortiClient endpoints across diverse environments, including scenarios that require multi-tenant deployments.

Understanding the Fortinet Vulnerability

The vulnerability, identified as CVE-2026-21643, is an SQL injection flaw that can be remotely exploited without the need for authentication. This is achievable through specially crafted HTTP requests, making it a significant threat. If successfully exploited, this flaw can lead to the execution of arbitrary code or commands, as highlighted in Fortinet’s advisory.

FortiClient EMS version 7.4.4 is affected by this security defect, which was internally identified by Fortinet and addressed with a patch in version 7.4.5 released in early February. Despite this, details about the vulnerability were publicly disclosed, and subsequent technical insights were provided by cybersecurity firm Bishop Fox, emphasizing the practical nature of the exploit.

Technical Insights and Exploitation Details

Bishop Fox’s analysis revealed that attackers could exploit the /api/v1/init_consts endpoint without prior authentication, leveraging the SQL injection flaw. This endpoint’s lack of lockout protections and its tendency to return database error messages allow attackers rapid access to sensitive data in vulnerable FortiClient EMS 7.4.4 deployments.

The issue originated from changes in version 7.4.4, specifically a redesigned middleware stack and database connection layer. These changes resulted in HTTP identification headers being unsanitized before authentication, exposing the system to arbitrary SQL code execution. Consequently, attackers could access admin credentials, security policies, endpoint inventory, and certificates.

Current Status and Response

Over the recent weekend, Defused Cyber highlighted that the CVE-2026-21643 vulnerability had been actively exploited for several days, affecting approximately 1,000 FortiClient EMS deployments exposed to the internet. The Shadowserver Foundation’s tracking indicates over 2,000 such instances accessible online as of March 30.

The extent of vulnerable deployments remains unclear, and Fortinet has not yet updated their advisory to explicitly mention exploitation. SecurityWeek has reached out to Fortinet for further comments on the exploitation, promising updates upon receiving a response.

As cyber threats continue to evolve, it is imperative for organizations using FortiClient EMS to apply necessary patches and stay vigilant against potential attacks. Regular updates and adherence to security advisories can significantly mitigate risks associated with such vulnerabilities.

Security Week News Tags:Bishop Fox, CVE-2026-21643, cyber attack, cyber threat, Cybersecurity, endpoint management, FortiClient EMS, Fortinet, Fortinet patch, network security, patch update, security vulnerability, SQL injection, Threat Actors, vulnerability exploitation

Post navigation

Previous Post: Silver Fox Intensifies Asia Cyber Campaign with New Trojan
Next Post: Telegram-Based ResokerRAT Threatens Windows Security

Related Posts

SonicWall Patches Exploited SMA 1000 Zero-Day SonicWall Patches Exploited SMA 1000 Zero-Day Security Week News
Cisco Patches Critical ISE Vulnerability With Public PoC Cisco Patches Critical ISE Vulnerability With Public PoC Security Week News
1.5 Million Impacted by Allianz Life Data Breach 1.5 Million Impacted by Allianz Life Data Breach Security Week News
Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers Security Week News
Ongoing Campaign Uses 60 NPM Packages to Steal Data Ongoing Campaign Uses 60 NPM Packages to Steal Data Security Week News
Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Big Tech Challenges Canadian Encryption Bill Amidst Security Concerns
  • Microsoft Warns of Attacks via HPE Operations Agent
  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Big Tech Challenges Canadian Encryption Bill Amidst Security Concerns
  • Microsoft Warns of Attacks via HPE Operations Agent
  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark