Chrome Security Updates by Google Released For Actively Exploited Zero-Day 2026
Chrome update released to patch a zero-day vulnerability that has been exploited in the wild.
Continue ReadingChrome update released to patch a zero-day vulnerability that has been exploited in the wild.
Continue ReadingFortinet released security updates for CVE-2026-2164
Fortinet has recently addressed a critical security vulnerability, identified as CVE-2026-21643, in its FortiClientEMS product. This flaw is classified as a SQL injection vulnerability, enables unauthenticated remote attackers to execute arbitrary code or system commands on affected systems by sending specially crafted HTTP requests.
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems.
Technical Details
With a CVSS v3.1 base score of 9.1, this vulnerability is considered critical and poses a significant risk to organizations relying on FortiClientEMS for endpoint management.
The flaws affect the following versions –
The vulnerability, CVE-2026-21643, resides in the FortiClientEMS administrative web interface.
Reason for the flaw or vulnerability to appear is caused by improper neutralization of user-supplied input in SQL queries. The flaw allows an unauthenticated attacker to send specially crafted HTTP requests to the FortiClientEMS GUI.
This resulted in the execution of arbitrary SQL statements, leading to unauthorized access, data exfiltration, privilege escalation and remote code execution (RCE) on any primary system.
Remediation
Immediate patching is strongly recommended to prevent potential exploitation, as the vulnerability allows attackers to bypass authentication and gain full control over the targeted system.
There is currently no evidence of exploitation in the wild but the flaw has been termed a high-priority issue for all organizations using the affected product version, reason the attack surface is vulnerable.
Fortinet has since acknowledged that the issue has been actively exploited by bad actors to create local admin accounts for persistence, make configuration changes granting VPN access to those accounts, and exfiltrate the firewall configurations.
Conclusion:
The vulnerability is not present in FortiClientEMS versions 7.2, 8.0, or FortiEMS Cloud. The issue has been resolved in FortiClientEMS version 7.4.5 and later.
In the past similar Fortinet SQL injection and remote code execution vulnerabilities were found in Fortinet products and was targeted by cybercriminals and state-sponsored actors for financial benefits.
VMware ESXi VMware vulnerabilities
Continue ReadingCritical Solar Winds Vulnerabilities being Exploited by Threat Actors
Continue ReadingAPT28 attack executes when victims open malicious documents in Microsoft Office:
Continue ReadingMicrosoft Released Emergency Security Updates
Continue ReadingA dangerous flaw in how Windows environments handle Kerberos service ticket requests one that significantly expands the practical attack surface for Kerberos relaying in Active Directory.
Continue ReadingCisco Patched Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways
Continue ReadingSonicWall has released a security update to fix a privilege escalation vulnerability in the SonicWall SMA1000 Appliance Management Console (AMC) that was tricked in zero-day attacks to escalate privileges.
Continue ReadingApple iOS & iPadOS Patch Zero-Days Vulnerabilities, Exploited in Targeted Attacks
Continue Reading
Recent Comments