Chrome Security Updates by Google Released For Actively Exploited Zero-Day 2026
Chrome update released to patch a zero-day vulnerability that has been exploited in the wild.
Continue ReadingChrome update released to patch a zero-day vulnerability that has been exploited in the wild.
Continue ReadingMicrosoft’s February 2026 Patch Tuesday
Continue ReadingFortinet released security updates for CVE-2026-2164
Fortinet has recently addressed a critical security vulnerability, identified as CVE-2026-21643, in its FortiClientEMS product. This flaw is classified as a SQL injection vulnerability, enables unauthenticated remote attackers to execute arbitrary code or system commands on affected systems by sending specially crafted HTTP requests.
Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems.
Technical Details
With a CVSS v3.1 base score of 9.1, this vulnerability is considered critical and poses a significant risk to organizations relying on FortiClientEMS for endpoint management.
The flaws affect the following versions –
The vulnerability, CVE-2026-21643, resides in the FortiClientEMS administrative web interface.
Reason for the flaw or vulnerability to appear is caused by improper neutralization of user-supplied input in SQL queries. The flaw allows an unauthenticated attacker to send specially crafted HTTP requests to the FortiClientEMS GUI.
This resulted in the execution of arbitrary SQL statements, leading to unauthorized access, data exfiltration, privilege escalation and remote code execution (RCE) on any primary system.
Remediation
Immediate patching is strongly recommended to prevent potential exploitation, as the vulnerability allows attackers to bypass authentication and gain full control over the targeted system.
There is currently no evidence of exploitation in the wild but the flaw has been termed a high-priority issue for all organizations using the affected product version, reason the attack surface is vulnerable.
Fortinet has since acknowledged that the issue has been actively exploited by bad actors to create local admin accounts for persistence, make configuration changes granting VPN access to those accounts, and exfiltrate the firewall configurations.
Conclusion:
The vulnerability is not present in FortiClientEMS versions 7.2, 8.0, or FortiEMS Cloud. The issue has been resolved in FortiClientEMS version 7.4.5 and later.
In the past similar Fortinet SQL injection and remote code execution vulnerabilities were found in Fortinet products and was targeted by cybercriminals and state-sponsored actors for financial benefits.
Insider Threat Target for Hacking Campaigns Turns Risky for Organization’s
Continue ReadingVMware ESXi VMware vulnerabilities
Continue ReadingCritical Solar Winds Vulnerabilities being Exploited by Threat Actors
Continue ReadingAPT28 attack executes when victims open malicious documents in Microsoft Office:
Continue ReadingIvanti has disclosed two critical code injection vulnerabilities in its Endpoint Manager Mobile (EPMM) product that enable unauthenticated remote code execution and have been exploited in zero-day attacks.
Continue ReadingCritical vm2 Node.js Library Sandbox Escape Vulnerability
Continue ReadingFortiCloud Single Sign-On (SSO)
Continue Reading
Recent Comments