Impact
A vulnerability in Fortinet FortiClientEMS versions 7.4.5 and 7.4.6 allows an unauthenticated attacker to execute arbitrary code or commands by sending specially crafted requests to the EMS API. The flaw is an improper access control that is classified as CWE-284 and bypasses authentication checks, enabling the attacker to gain control of the FortiClientEMS process and potentially compromise the host system.
Affected Systems
Fortinet FortiClientEMS versions 7.4.5 through 7.4.6 are affected. The product is part of Fortinet's endpoint management suite. No earlier release versions are listed as affected in the provided data.
Risk and Exploitability
Based on the description, it is inferred that attackers can launch the exploit over the network by sending crafted requests to the EMS API without needing initial authentication, making the flaw highly attractive to threat actors. The CVSS score of 9.1 indicates high severity, and the EPSS score of 41% reflects a moderate to high probability of exploitation. The vulnerability is listed in the CISA KEV catalog, showing that public exploits have been observed.
OpenCVE Enrichment