{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreihyabep2sjx2d3scm7h73bixjfkby57txtpacqq4xbfyoqqir6q7a",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3micw6dcpzms2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreierc5lb5nwizvwu23cuun33zcxwo72isrunbzarpxvsdrhr7zy6q4"
    },
    "mimeType": "image/jpeg",
    "size": 37941
  },
  "path": "/critical-forticlient-ems-flaw-is-under-active-attack-and-exposed-servers-need-patching-now/",
  "publishedAt": "2026-03-30T17:24:16.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Critical FortiClient EMS flaw is under active attack, and exposed servers need patching now",
    "VPN Central"
  ],
  "textContent": "A critical Fortinet FortiClient EMS vulnerability is now being exploited in the wild. Fortinet’s own advisory says CVE-2026-21643 is an unauthenticated SQL injection flaw in the FortiClient EMS administrative interface, and the company rates it Critical with a CVSS score of 9.1. The bug affects FortiClient EMS 7.4.4 and allows an unauthenticated attacker to execute […]\n\nThe post Critical FortiClient EMS flaw is under active attack, and exposed servers need patching now appeared first on VPN Central.",
  "title": "Critical FortiClient EMS flaw is under active attack, and exposed servers need patching now"
}