![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDC4ybcFx_TM6RTVtiOzBVlawqdS9cKLGLr37h_c_QqybQ8wc3kLibnDp2b7hmCzXPsfbx5jk2Ge6Zhfq5I0KqYrEVfgCTXulf5v7Sc9Z7fxeky6LNj30j3o8YPLr4vCLetoz0yN3f1vrsSqQqk1F3Kzcx9Lco-IiGyViOPzkVKT4-z2NRt8eUwwbVGTjl/s1600/email.png)
Cybersecurity researchers have discovered a new campaign that’s exploiting a recently disclosed security flaw in Fortinet FortiClient EMS devices to deliver ScreenConnect and Metasploit Powerfun payloads.
The activity entails the exploitation of CVE-2023-48788 (CVSS score: 9.3), a critical SQL injection flaw that could permit an unauthenticated attacker to execute unauthorized code or
Source:: The Hackers News