Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
- Last update: 31/03/2026
- Affected software:
→ Fortinet FortiClientEMS 7.4.4- Type: CWE-89: Execute unauthorized code or commands
- CVE/CVSS
→ CVE-2026-21643: CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Fortinet - https://fortiguard.fortinet.com/psirt/FG-IR-25-1142
Fortinet's FortiClient EMS is used for managing and securing an organization's endpoints and their connection to the network.
CVE-2026-21643 is a critical SQL injection vulnerability (CVSS 9.1) that is reported to be actively exploited in the wild. It requires no authentication and has a public Proof-of-Concept. Successful exploitation could allow attackers to steal data, manipulate configurations, or achieve full remote code execution.
A similar flaw (CVE-2023-48788) was leveraged in ransomware campaigns, so similar targeting is expected.
Upgrade to FortiClient EMS 7.4.5 or above immediately.
CVE-2026-21643: FortiClient EMS (Critical, Actively Exploited)
Only FortiClient EMS 7.4.4 is affected (versions 7.2 and 8.0 are not). An attacker can send a crafted GET request to /api/v1/init_consts with a malicious Site header to inject arbitrary SQL. This can lead to data exfiltration, database manipulation, or OS command execution through chaining. Single-site (non-multi-tenant) deployments are reported as not affected.
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
If possible block public internet access to the EMS web interface and limit it to trusted management networks.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
Review logs for suspicious requests to /api/v1/init_consts or unusual Site header values. If your instance was internet-facing and unpatched, assume potential compromise and investigate accordingly.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.
Bishopfox - https://bishopfox.com/blog/cve-2026-21643-pre-authentication-sql-injection-in-forticlient-ems-7-4-4
Helpnetsecurity - https://www.helpnetsecurity.com/2026/03/30/forticlient-ems-cve-2026-21643-reported-exploitation/
CVE.org - https://www.cve.org/CVERecord?id=CVE-2026-21643