<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ali Dak</title>
    <description>The latest articles on DEV Community by Ali Dak (@yuznumara).</description>
    <link>https://dev.to/yuznumara</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3859264%2Fac167c85-fe8c-4f9c-ba37-a717dc051894.png</url>
      <title>DEV Community: Ali Dak</title>
      <link>https://dev.to/yuznumara</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/yuznumara"/>
    <language>en</language>
    <item>
      <title>CVE-2026-21643: FortiClient EMS Critical SQL Injection — Actively Exploited, No Credentials Required</title>
      <dc:creator>Ali Dak</dc:creator>
      <pubDate>Fri, 03 Apr 2026 10:18:39 +0000</pubDate>
      <link>https://dev.to/yuznumara/cve-2026-21643-forticlient-ems-critical-sql-injection-actively-exploited-no-credentials-required-186d</link>
      <guid>https://dev.to/yuznumara/cve-2026-21643-forticlient-ems-critical-sql-injection-actively-exploited-no-credentials-required-186d</guid>
      <description>&lt;p&gt;&lt;em&gt;Originally published at &lt;a href="https://vulntracker.io/blog/forticlient-ems-cve-2026-21643-sql-injection-actively-exploited" rel="noopener noreferrer"&gt;vulntracker.io&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;A critical SQL injection vulnerability in Fortinet FortiClient Enterprise Management Server (EMS) is now being actively exploited in real-world attacks. The flaw, tracked as CVE-2026-21643, allows a remote, unauthenticated attacker to execute arbitrary SQL commands against the backend PostgreSQL database — with a single HTTP request.&lt;/p&gt;

&lt;p&gt;No credentials needed. No user interaction required. Just one crafted HTTP header.&lt;/p&gt;

&lt;h2&gt;
  
  
  How the Vulnerability Works
&lt;/h2&gt;

&lt;p&gt;FortiClient EMS v7.4.4 introduced a refactored middleware stack for its multi-tenant deployment feature. The HTTP header used to identify which tenant a request belongs to gets passed directly into a database query — without any sanitization — and before any authentication check.&lt;/p&gt;

&lt;p&gt;An attacker who can reach the EMS web interface over HTTPS can exploit this in a single request. The result: full access to admin credentials, endpoint inventory data, security policies, and certificates for managed endpoints.&lt;/p&gt;

&lt;p&gt;One request to the management server, and the attacker sees everything.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Exploitation Timeline
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;February 6&lt;/strong&gt; — Fortinet discloses CVE-2026-21643 and releases FortiClient EMS 7.4.5&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Early March&lt;/strong&gt; — Bishop Fox publishes a technical deep dive&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;March 25&lt;/strong&gt; — First exploitation observed in the wild (Defused Cyber)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;March 29&lt;/strong&gt; — Active exploitation publicly reported&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;March 30&lt;/strong&gt; — Multiple security outlets confirm the threat&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;At the time of writing, CISA has not yet added it to KEV, but the attacks are already happening.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why FortiClient EMS Is a High-Value Target
&lt;/h2&gt;

&lt;p&gt;FortiClient EMS controls endpoint agents across an organization's entire device fleet — Windows, macOS, Linux, iOS, Android. Compromising EMS means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Admin credential theft&lt;/strong&gt; — full management console access&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Endpoint inventory exposure&lt;/strong&gt; — attackers learn every device in the network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Security policy manipulation&lt;/strong&gt; — disable protections, create backdoors&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Certificate access&lt;/strong&gt; — endpoint authentication certificates&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lateral movement&lt;/strong&gt; — from management server to every endpoint&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This follows a pattern in 2026: the security management tool becomes the attack vector.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who's Affected
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Only FortiClient EMS version 7.4.4&lt;/strong&gt; in multi-tenant mode. Versions 7.2 and 8.0 are not affected. Single-site deployments are not affected.&lt;/p&gt;

&lt;p&gt;Shodan data shows approximately 1,000 FortiClient EMS instances publicly exposed. The Shadowserver Foundation tracks over 2,000, with 1,400+ IPs in the US and Europe.&lt;/p&gt;

&lt;h2&gt;
  
  
  What To Do
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Check your version.&lt;/strong&gt; If running 7.4.4, upgrade to 7.4.5 immediately&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Restrict access&lt;/strong&gt; to the EMS web interface — it should not be internet-exposed&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review logs&lt;/strong&gt; for anomalous tenant-identification headers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;If exploitation occurred:&lt;/strong&gt; rotate admin credentials, audit endpoint certificates, review security policies&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;em&gt;CVE-2026-21643 · CVSS 9.3 · Affected: FortiClient EMS 7.4.4 (multi-tenant) · Fix: Upgrade to 7.4.5&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Want to track vulnerabilities like this automatically?&lt;/strong&gt; &lt;a href="https://vulntracker.io" rel="noopener noreferrer"&gt;VulnTracker&lt;/a&gt; monitors your tech stack and alerts you the moment a new CVE affects your products — via email, Telegram, or Slack. Free to start.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://vulntracker.io" rel="noopener noreferrer"&gt;vulntracker.io&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>news</category>
      <category>sql</category>
    </item>
  </channel>
</rss>
