CVE-2023-48788

critical

Description

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

From the Tenable Blog

CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability
CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability

Published: 2024-03-14

Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software.

References

https://www.theregister.com/2025/03/13/medusa_ransomware_infects_300_critical/

https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a

https://www.helpnetsecurity.com/2025/02/13/sandworm-apts-initial-access-subgroup-hits-organizations-accross-the-globe/

https://hackread.com/microsoft-badpilot-campaign-seashell-blizzard-usa-uk/

https://www.theregister.com/2025/02/12/russias_sandworm_caught_stealing_credentials/

https://www.securityweek.com/russian-seashell-blizzard-hackers-gain-maintain-access-to-high-value-targets-microsoft/

https://www.microsoft.com/en-us/security/blog/2025/02/12/the-badpilot-campaign-seashell-blizzard-subgroup-conducts-multiyear-global-access-operation/

https://www.darkreading.com/threat-intelligence/microsoft-russian-sandworm-apt-exploits-edge-bugs-globally

https://www.bleepingcomputer.com/news/security/badpilot-network-hacking-campaign-fuels-russian-sandworm-attacks/

https://therecord.media/sandworm-subgroup-russia-europe

https://thehackernews.com/2025/02/microsoft-uncovers-sandworm-subgroups.html

https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html

https://securelist.com/patched-forticlient-ems-vulnerability-exploited-in-the-wild/115046/

https://www.theregister.com/2024/11/27/salt_typhoons_us_telcos/

https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html

https://www.trendmicro.com/en_us/research/24/k/earth-estries.html

https://www.bleepingcomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/

https://thehackernews.com/2024/10/ransomware-gangs-use-lockbits-fame-to.html

https://blog.talosintelligence.com/akira-ransomware-continues-to-evolve/

https://securityonline.info/cve-2023-48788-exploited-researcher-details-cyberattacks-on-fortinet-ems/?&web_view=true#google_vignette

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a

https://redcanary.com/blog/cve-2023-48788/

https://securityaffairs.com/160885/uncategorized/fortinet-forticlient-ems-critical-flaw.html

Details

Source: Mitre, NVD

Published: 2024-03-12

Updated: 2025-01-27

Known Exploited Vulnerability (KEV)

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.94233

Vulnerability Watch

Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.

Vulnerability of Interest