{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreihyabep2sjx2d3scm7h73bixjfkby57txtpacqq4xbfyoqqir6q7a",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3micw6dcpzms2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreierc5lb5nwizvwu23cuun33zcxwo72isrunbzarpxvsdrhr7zy6q4"
},
"mimeType": "image/jpeg",
"size": 37941
},
"path": "/critical-forticlient-ems-flaw-is-under-active-attack-and-exposed-servers-need-patching-now/",
"publishedAt": "2026-03-30T17:24:16.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Critical FortiClient EMS flaw is under active attack, and exposed servers need patching now",
"VPN Central"
],
"textContent": "A critical Fortinet FortiClient EMS vulnerability is now being exploited in the wild. Fortinet’s own advisory says CVE-2026-21643 is an unauthenticated SQL injection flaw in the FortiClient EMS administrative interface, and the company rates it Critical with a CVSS score of 9.1. The bug affects FortiClient EMS 7.4.4 and allows an unauthenticated attacker to execute […]\n\nThe post Critical FortiClient EMS flaw is under active attack, and exposed servers need patching now appeared first on VPN Central.",
"title": "Critical FortiClient EMS flaw is under active attack, and exposed servers need patching now"
}