FortiClientEMS Vulnerabilities Under Active Exploitation, Expose Systems to RCE
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章内容,看起来是关于Fortinet的端点管理平台FortiClientEMS的两个漏洞。 首先,我需要快速浏览文章,抓住关键点。文章提到了两个漏洞:CVE-2026-35616和CVE-2026-21643。这两个漏洞都是远程代码执行(RCE)的漏洞,且已经被积极利用。 接下来,我需要确定每个漏洞的具体情况。第一个漏洞CVE-2026-35616是由于不正确的访问控制导致的,攻击者可以绕过API的身份验证和授权机制。第二个漏洞CVE-2026-21643是一个SQL注入问题,同样允许未认证的攻击者执行任意代码。 然后,文章提到这些漏洞已经被实际利用,并且影响了特定版本的FortiClientEMS。受影响的版本包括7.4.4、7.4.5到7.4.6。修复措施包括升级到特定版本或应用热补丁。 最后,政府机构如CISA和新加坡网络安全局也发布了警告,强调了这些漏洞的严重性,并敦促组织立即采取行动。 现在,我需要将这些信息浓缩到100字以内。要确保涵盖主要漏洞、影响、被利用的情况以及修复建议。同时,避免使用复杂的术语,保持简洁明了。 总结起来:FortiClientEMS存在两个严重漏洞(SQL注入和访问控制问题),已被利用。影响多个版本,需升级或应用补丁修复。 </think> FortiClientEMS 存在两个严重漏洞(SQL 注入和访问控制问题),已被积极利用。受影响版本包括 7.4.4 至 7.4.6,需升级至 7.4.5 或 7.4.7 以修复风险。 2026-4-7 06:34:32 Author: thecyberexpress.com(查看原文) 阅读量:22 收藏

A newly disclosed set of vulnerabilities affecting Fortinet’s endpoint management platform has raised serious concerns among cybersecurity professionals, particularly as both flaws are already being actively exploited.

The issues, tracked as CVE-2026-35616 and CVE-2026-21643, impact FortiClientEMS and expose systems to unauthenticated remote code execution (RCE), with attackers requiring no prior access to compromise affected servers. 

One of the vulnerabilities, CVE-2026-21643, stems from an improper neutralization of special elements in SQL commands, commonly referred to as a SQL Injection flaw (CWE-89). This weakness exists within the administrative interface of FortiClientEMS, allowing unauthenticated attackers to send specially crafted HTTP requests and execute unauthorized code or commands. 

Critical SQL Injection Flaw in FortiClientEMS (CVE-2026-21643) 

Security researchers have confirmed that this SQL Injection issue is not just theoretical. It has already been observed being exploited in real-world attacks, increasing the urgency for mitigation. Because the flaw does not require authentication, attackers can directly target exposed systems, making it a particularly dangerous entry point. 

In terms of affected versions, FortiClientEMS 7.4.4 is vulnerable and requires an upgrade to version 7.4.5 or later. Versions 8.0 and 7.2 are not affected by this issue. The vulnerability was internally discovered and reported by Gwendal Guégniaud of Fortinet’s Product Security team. The initial advisory was published on February 6, 2026, with a subsequent clarification removing FortiEMS Cloud from the affected products list. 

Improper Access Control Vulnerability (CVE-2026-35616) 

The second major flaw, CVE-2026-35616, involves improper access control (CWE-284) in FortiClientEMS. This vulnerability enables attackers to bypass API authentication and authorization mechanisms, again allowing unauthenticated execution of arbitrary code or commands through crafted requests. 

report-ad-banner

Like the SQL Injection flaw, CVE-2026-35616 has also been confirmed to be actively exploited in the wild. The potential impact is severe, as successful exploitation could lead to a complete compromise of the FortiClientEMS server. 

The vulnerability was officially published on April 4, 2026, and later added to the Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) Catalog on April 6, 2026. CISA noted that such vulnerabilities are frequently used by malicious actors and pose significant risks, particularly to federal enterprise environments. 

Government and Industry Response 

The Cyber Security Agency of Singapore (CSA) issued an alert on April 6, 2026, warning of the active exploitation of CVE-2026-35616 in FortiClientEMS deployments. The advisory noted the critical nature of the vulnerability and urged organizations to take immediate action. 

According to the alert, “successful exploitation of this vulnerability could allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests, potentially resulting in a full compromise of the FortiClient EMS server.” The agency also reiterated that exploitation activity has already been observed in the wild. 

Affected Versions and Mitigation Steps 

The improper access control vulnerability CVE-2026-35616 affects FortiClientEMS versions 7.4.5 through 7.4.6. Organizations using these versions are advised to apply the available hotfix immediately and upgrade to version 7.4.7 or later once it becomes available. 

Fortinet has provided specific guidance for applying fixes through its official release notes for versions 7.4.5 and 7.4.6. The company has indicated that the upcoming FortiClientEMS 7.4.7 release will include a permanent fix, while the currently available hotfix is sufficient to fully mitigate the issue in the interim. 

For CVE-2026-21643, upgrading from version 7.4.4 to 7.4.5 or above resolves the SQL Injection vulnerability. 


文章来源: https://thecyberexpress.com/forticlientems-flaws-under-active-exploitation/
如有侵权请联系:admin#unsafe.sh