Impact
An improper neutralization of special elements used in an SQL command permits SQL injection in FortiClientEMS 7.4.4. This flaw allows an unauthenticated attacker to supply crafted HTTP requests that result in execution of arbitrary SQL statements, thereby potentially enabling the attacker to execute unauthorized code or commands. The vulnerability can compromise confidentiality, integrity, and availability of the system.
Affected Systems
The affected product is Fortinet FortiClientEMS, specifically version 7.4.4. Fortinet has advised upgrading to version 7.4.5 or higher, or the upcoming 8.0.0 release, to address the issue.
Risk and Exploitability
The CVSS score of 9.1 indicates critical severity. An EPSS score of 43% indicates a high probability that the vulnerability will be exploited. The vulnerability is listed in the CISA Known Exploited Vulnerabilities catalog, suggesting that it is actively targeted. Attackers can exploit the flaw remotely as an unauthenticated user by sending specially crafted HTTP requests to the FortiClientEMS service, potentially leading to remote code execution.
OpenCVE Enrichment