CVE-2023-48788
FortiClient EMS Análisis y mitigación de vulnerabilidades

Vista general

A critical SQL injection vulnerability (CVE-2023-48788) was discovered in Fortinet FortiClientEMS that affects versions 7.2.0 through 7.2.2 and 7.0.1 through 7.0.10. The vulnerability allows an unauthenticated attacker to execute unauthorized code or commands via specifically crafted requests. The vulnerability has been assigned a CVSSv3 score of 9.3 and is currently being exploited in the wild (Fortiguard PSIRT).

Técnicas

The vulnerability (CVE-2023-48788) is an improper neutralization of special elements used in SQL commands (SQL Injection) [CWE-89] in the DAS component of FortiClientEMS. The vulnerability exists in binary components written in C++ and Golang, compiled for 64-bit x86 Windows targets, using a custom linefeed-based protocol. The exploitation involves manipulating SQL commands through XP_CMDSHELL to achieve remote code execution (Horizon3).

Impacto

The successful exploitation of this vulnerability allows attackers to execute unauthorized code or commands on the affected systems. This can lead to complete system compromise, as the vulnerability provides attackers with the ability to execute arbitrary commands through SQL injection (Fortiguard PSIRT).

Mitigación y soluciones alternativas

Fortinet has released patches to address this vulnerability. Organizations should upgrade FortiClientEMS version 7.2.x to version 7.2.3 or above, and version 7.0.x to version 7.0.11 or above. Additionally, an IPS signature named 'FG-VD-54509.0day:FortiClientEMS.DAS.SQL.Injection' is available in FMWP db update 27.750 to help detect and prevent exploitation attempts (Fortiguard PSIRT).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado FortiClient EMS Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2026-35616CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_enterprise_management_server
Apr 04, 2026
CVE-2026-21643CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
Feb 06, 2026
CVE-2023-48788CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
Mar 12, 2024
CVE-2024-33508HIGH7.3
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_enterprise_management_server
NoSep 10, 2024
CVE-2024-21753MEDIUM6
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
NoSep 10, 2024

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades