Known Exploited Vulnerability
9.8
CRITICAL CVSS 3.1
CVE-2023-48788
Fortinet FortiClient EMS SQL Injection Vulnerability - [Actively Exploited]
Description

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

INFO

Published Date :

March 12, 2024, 3:15 p.m.

Last Modified :

Jan. 27, 2025, 8:56 p.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Fortinet FortiClient EMS contains a SQL injection vulnerability that allows an unauthenticated attacker to execute commands as SYSTEM via specifically crafted requests.

Required Action :

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Notes :

https://www.fortiguard.com/psirt/FG-IR-24-007; https://nvd.nist.gov/vuln/detail/CVE-2023-48788

Affected Products

The following products are affected by CVE-2023-48788 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Fortinet forticlient_enterprise_management_server
2 Fortinet forticlientems
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL [email protected]
CVSS 3.1 CRITICAL [email protected]
Solution
This information is provided by the 3rd party feeds.
  • Upgrade to Fortinet FortiClient EMS version 7.0.11 / 7.2.3 or later.
Public PoC/Exploit Available at Github

CVE-2023-48788 has a 13 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-48788.

URL Resource
https://fortiguard.com/psirt/FG-IR-24-007 Vendor Advisory
https://fortiguard.com/psirt/FG-IR-24-007 Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-48788 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Python Dockerfile

Updated: 1 week, 1 day ago
28 stars 2 fork 2 watcher
Born at : Jan. 3, 2025, 9:23 p.m. This repo has been linked 9 different CVEs too.

A super simple Cisa KEV lookup CLI tool leveraging DuckDB

Python

Updated: 1 year, 1 month ago
1 stars 0 fork 0 watcher
Born at : July 2, 2024, 7:56 p.m. This repo has been linked 33 different CVEs too.

CLI utility to query Shodan's CVE DB

cve-search shodan shodan-client

Go

Updated: 5 months, 2 weeks ago
3 stars 0 fork 0 watcher
Born at : May 12, 2024, 10 a.m. This repo has been linked 31 different CVEs too.

None

Updated: 1 year, 4 months ago
2 stars 0 fork 0 watcher
Born at : April 15, 2024, 6:52 a.m. This repo has been linked 1 different CVEs too.

None

Updated: 1 year, 4 months ago
4 stars 0 fork 0 watcher
Born at : April 9, 2024, 10:54 a.m. This repo has been linked 1 different CVEs too.

Ini adalah repository kumpulan CVE v.5

allcve cve cvelist newcve

Updated: 1 year ago
2 stars 0 fork 0 watcher
Born at : March 24, 2024, 3:01 p.m. This repo has been linked 1214 different CVEs too.

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

Updated: 1 year, 5 months ago
1 stars 0 fork 0 watcher
Born at : March 22, 2024, 10:53 p.m. This repo has been linked 1 different CVEs too.

CVE-2023-48788 PoC SQLi----> RCE

Updated: 1 year, 5 months ago
7 stars 0 fork 0 watcher
Born at : March 22, 2024, 7:06 p.m. This repo has been linked 1 different CVEs too.

Fortinet FortiClient EMS SQL Injection

Python

Updated: 1 month, 2 weeks ago
50 stars 10 fork 10 watcher
Born at : March 18, 2024, 8:50 p.m. This repo has been linked 1 different CVEs too.

CVE-2023-48788 is a SQLi vulnerability which leads to unauthenticated remote code executing in fortinet's FortiClientEMS.

Updated: 1 year, 5 months ago
1 stars 0 fork 0 watcher
Born at : March 18, 2024, 4:25 a.m. This repo has been linked 1 different CVEs too.

CVE-2023-48788 is a SQLi vulnerability which leads to unauthenticated remote code executing in fortinet's FortiClientEMS.

Updated: 1 year, 5 months ago
1 stars 0 fork 0 watcher
Born at : March 15, 2024, 2:14 a.m. This repo has been linked 1 different CVEs too.

New exploit for Fortinet's [CVE-2023-48788] to SQL injection in HTTP reqs.

Updated: 1 year, 5 months ago
8 stars 0 fork 0 watcher
Born at : March 13, 2024, 1:24 p.m. This repo has been linked 1 different CVEs too.

Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's Asteroid and Bug Bounty programs.

cisa-kev vulnerability 0day cisa exploits

Updated: 3 weeks, 5 days ago
581 stars 42 fork 42 watcher
Born at : April 19, 2022, 8:58 a.m. This repo has been linked 1287 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-48788 vulnerability anywhere in the article.

  • CybersecurityNews
Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July

The ransomware threat landscape witnessed a concerning surge in July 2025, with the Qilin ransomware group maintaining its dominant position for the third time in four months. The group successfully c ... Read more

Published Date: Aug 14, 2025 (2 weeks, 6 days ago)
  • Red Canary
Our favorite talks from fwd:cloudsec 2025

In June 2025, the cloud security community converged on Denver, Colorado, for fwd:cloudsec North America 2025, and Red Canary was thrilled to be a sponsor! Hundreds of passionate cloud security practi ... Read more

Published Date: Jul 30, 2025 (1 month ago)
  • Daily CyberSecurity
Kaspersky Report Reveals Growing Threat from Old Exploits and OS Vulnerabilities in Q1 2025

Kaspersky’s latest “Exploits and vulnerabilities in Q1 2025” shows that attackers are doubling down on aging exploits, platform-specific weaknesses, and mismanaged updates. With over 9,700 vulnerabili ... Read more

Published Date: Jun 03, 2025 (3 months ago)
  • Daily CyberSecurity
PumaBot: New Stealthy Linux Botnet Evades Detection, Targets IoT Devices

Cybersecurity researchers at Darktrace have exposed a stealthy and persistent Linux-based botnet dubbed PumaBot, which leverages Go binaries, SSH brute-force attacks, and custom backdoors to target In ... Read more

Published Date: Jun 01, 2025 (3 months ago)
  • Daily CyberSecurity
SocGholish Reloaded: Darktrace Uncovers Ransomware-Primed Loader Campaign

In a recent report, Darktrace’s Threat Research team has detailed a sophisticated malware campaign involving the SocGholish loader—a JavaScript-based first-stage malware now weaponized by ransomware a ... Read more

Published Date: May 05, 2025 (3 months, 4 weeks ago)
  • security.nl
Mandiant: kwetsbaarheden in vpn-software vaakst aangevallen vorig jaar

Kwetsbaarheden in vpn-software blijven een zeer populair doelwit van aanvallers, zo stelt Mandiant. De helft van alle cyberincidenten die het securitybedrijf vorig jaar onderzocht begonnen via kwetsba ... Read more

Published Date: Apr 28, 2025 (4 months ago)
  • Help Net Security
Understanding 2024 cyber attack trends

Mandiant has released the M-Trends 2025 report, which outlines global cyber attack trends based on their own incident response engagements from 2024. Key trends and insights In 2024, Mandiant handled ... Read more

Published Date: Apr 24, 2025 (4 months, 1 week ago)
  • Cybersecurity News
Google Streamlines “Results About You” Removal Process

Since 2021, Google has gradually introduced tools that allow users to exert greater control over the presence of their personal information in search results. More recently, the company has made it ev ... Read more

Published Date: Feb 28, 2025 (6 months ago)
  • The Hacker News
Microsoft Uncovers Sandworm Subgroup's Global Cyber Attacks Spanning 15+ Countries

A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe. "Th ... Read more

Published Date: Feb 12, 2025 (6 months, 3 weeks ago)
  • The Register
Russia's Sandworm caught snarfing credentials, data from American and Brit orgs

An initial-access subgroup of Russia's Sandworm last year wriggled its way into networks within the US, UK, Canada and Australia, stealing credentials and data from "a limited number of organizations, ... Read more

Published Date: Feb 12, 2025 (6 months, 3 weeks ago)
  • Dark Reading
Microsoft: Russia's Sandworm APT Exploits Edge Bugs Globally

Source: Kenishirotie via Alamy Stock PhotoArguably, no advanced persistent threat (APT) enjoys as much notoriety as Sandworm, otherwise known as Military Unit 74455 within Russia's military intelligen ... Read more

Published Date: Feb 12, 2025 (6 months, 3 weeks ago)
  • BleepingComputer
BadPilot network hacking campaign fuels Russian SandWorm attacks

A subgroup of the Russian state-sponsored hacking group APT44, also known as 'Seashell Blizzard' and 'Sandworm', has been targeting critical organizations and governments in a multi-year campaign dubb ... Read more

Published Date: Feb 12, 2025 (6 months, 3 weeks ago)
  • Cybersecurity News
IBM’s HashiCorp Acquisition Under Scrutiny: CMA Investigates Competition Concerns

The United Kingdom’s Competition and Markets Authority (CMA) recently announced that it would launch an investigation into IBM’s $6.4 billion acquisition of HashiCorp, a software company specializing ... Read more

Published Date: Dec 31, 2024 (8 months ago)
  • TheCyberThrone
Most Exploited Vulnerabilities in 2024 Top 20 Analysis

In 2024, the cybersecurity landscape saw a significant number of exploited vulnerabilities, highlighting the ongoing challenges organizations face in protecting their systems and data.Some key trends ... Read more

Published Date: Dec 22, 2024 (8 months, 1 week ago)
  • The Hacker News
Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools

Vulnerability / Cyber Attack A now-patched critical security flaw impacting Fortinet FortiClient EMS is being exploited by malicious actors as part of a cyber campaign that installed remote desktop so ... Read more

Published Date: Dec 20, 2024 (8 months, 2 weeks ago)
  • Cybersecurity News
Kaspersky Uncovers Active Exploitation of Fortinet Vulnerability CVE-2023-48788

In a recent investigation, Kaspersky’s Global Emergency Response Team (GERT) uncovered active exploitation of a patched vulnerability in Fortinet FortiClient EMS. This SQL injection vulnerability, ide ... Read more

Published Date: Dec 19, 2024 (8 months, 2 weeks ago)
  • Kaspersky
Attackers exploiting a patched FortiClient EMS vulnerability in the wild

Introduction During a recent incident response, Kaspersky’s GERT team identified a set of TTPs and indicators linked to an attacker that infiltrated a company’s networks by targeting a Fortinet vulner ... Read more

Published Date: Dec 19, 2024 (8 months, 2 weeks ago)
  • The Register
Salt Typhoon's surge extends far beyond US telcos

The reach of the China-linked Salt Typhoon gang extends beyond telecommunications giants in the United States, and its arsenal includes several backdoors – including a brand-new malware dubbed GhostSp ... Read more

Published Date: Nov 27, 2024 (9 months, 1 week ago)
  • Darktrace
FortiClient EMS exploited: Inside the attack chain and post-exploitation tactics

Soon after CVE-2023-48788 was publicly disclosed in late March 2024, Darktrace began to see compromises in FortiClient EMS devices on customer networks. Read on to find out more about what our Threat ... Read more

Published Date: Nov 27, 2024 (9 months, 1 week ago)
  • Cybersecurity News
CVE-2024-21887 and More: How Earth Estries APT Group Exploits VPNs & Servers

Campaign Alpha overview | Image: Trend MicroIn a detailed report from Trend Micro, the Chinese advanced persistent threat (APT) group Earth Estries, also known by aliases like Salt Typhoon and GhostEm ... Read more

Published Date: Nov 27, 2024 (9 months, 1 week ago)

The following table lists the changes that have been made to the CVE-2023-48788 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Jan. 27, 2025

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:* versions from (including) 7.0.1 up to (including) 7.0.10 *cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (including) 7.2.2 OR *cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:* versions from (including) 7.0.1 up to (excluding) 7.0.11 *cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (excluding) 7.2.3
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://fortiguard.com/psirt/FG-IR-24-007
  • CVE Modified by [email protected]

    Jun. 04, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    May. 23, 2024

    Action Type Old Value New Value
    Changed Reference Type https://fortiguard.com/psirt/FG-IR-24-007 No Types Assigned https://fortiguard.com/psirt/FG-IR-24-007 Vendor Advisory
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Mar. 26, 2024

    Action Type Old Value New Value
    Added Due Date 2024-04-15
    Added Required Action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
    Added Vulnerability Name Fortinet FortiClient EMS SQL Injection Vulnerability
    Added Date Added 2024-03-25
  • CVE Modified by [email protected]

    Mar. 19, 2024

    Action Type Old Value New Value
    Added Reference Fortinet, Inc. https://fortiguard.com/psirt/FG-IR-24-007 [No types assigned]
    Removed Reference Fortinet, Inc. https://fortiguard.com/psirt/FG-IR-23-430
  • Initial Analysis by [email protected]

    Mar. 15, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://fortiguard.com/psirt/FG-IR-23-430 No Types Assigned https://fortiguard.com/psirt/FG-IR-23-430 Vendor Advisory
    Added CPE Configuration OR *cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:* versions from (including) 7.0.1 up to (including) 7.0.10 *cpe:2.3:a:fortinet:forticlient_enterprise_management_server:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (including) 7.2.2
  • CVE Received by [email protected]

    Mar. 12, 2024

    Action Type Old Value New Value
    Added Description A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.
    Added Reference Fortinet, Inc. https://fortiguard.com/psirt/FG-IR-23-430 [No types assigned]
    Added CWE Fortinet, Inc. CWE-89
    Added CVSS V3.1 Fortinet, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 9.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact