Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章内容,抓住关键点。 文章主要讲的是Fortinet发布了安全更新,修复了FortiClientEMS中的一个严重漏洞,编号是CVE-2026-21643,CVSS评分9.1。这个漏洞属于SQL注入类型,可能让攻击者通过特制的HTTP请求执行任意代码。受影响的版本有7.4.4,建议升级到7.4.5或以上。另外,Fortinet团队的Gwendal Guégniaud发现了这个漏洞。虽然目前没有被利用的报告,但用户还是应该尽快修复。 同时,文章还提到Fortinet之前修复了另一个高危漏洞CVE-2026-24858(CVSS 9.4),影响多个产品。攻击者利用FortiCloud账户可以入侵其他设备,并进行配置更改和数据外泄。 总结时要涵盖主要漏洞、影响版本、评分、发现者以及另一个相关漏洞的情况。要简洁明了,不超过100字。 </think> Fortinet修复了FortiClientEMS中的严重SQL注入漏洞(CVE-2026-21643),CVSS评分9.1,影响部分版本;同时披露另一高危漏洞(CVE-2026-24858)已被利用。 2026-2-10 04:38:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Vulnerability / Network Security

Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems.

The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0.

"An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests," Fortinet said in an advisory.

The shortcoming affects the following versions -

  • FortiClientEMS 7.2 (Not affected)
  • FortiClientEMS 7.4.4 (Upgrade to 7.4.5 or above)
  • FortiClientEMS 8.0 (Not affected)

Gwendal Guégniaud of the Fortinet Product Security team has been credited with discovering and reporting the flaw.

While Fortinet makes no mention of the vulnerability being exploited in the wild, it's essential that users move quickly to apply the fixes.

The development comes as the company addressed another critical severity flaw in FortiOS, FortiManager, FortiAnalyzer, FortiProxy, FortiWeb (CVE-2026-24858, CVSS score: 9.4) that allows an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Fortinet has since acknowledged that the issue has been actively exploited by bad actors to create local admin accounts for persistence, make configuration changes granting VPN access to those accounts, and exfiltrate the firewall configurations.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
如有侵权请联系:admin#unsafe.sh