VulnerabilitiesCRITICAL

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

Featured image for Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited
CSCyber Security News·Reporting by Guru Baran
📰 3 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

There's a serious security hole in Fortinet's software that hackers are using to break in without permission. Fortinet has released fixes, and it's really important for users to update their software right away to stay safe.

Quick Summary

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

The Flaw

Fortinet has confirmed a critical zero-day vulnerability in FortiClient EMS, tracked as CVE-2026-35616, with a CVSSv3 score of 9.1. This vulnerability allows unauthenticated attackers to bypass API authentication and authorization controls, enabling them to execute arbitrary code or commands on vulnerable systems. Classified under CWE-284 (Improper Access Control), the flaw resides in the API layer of FortiClient Endpoint Management Server (EMS). Notably, the vulnerability has been described as a pre-authentication API access bypass leading to privilege escalation.

What's at Risk

The vulnerability affects FortiClient EMS versions 7.4.5 and 7.4.6, while version 7.2.x remains unaffected. Successful exploitation can lead to privilege escalation, compromising the confidentiality, integrity, and availability of the affected systems. Exploitation attempts were first recorded against honeypots on March 31, 2026, indicating a rapid escalation in threat activity leading up to the public disclosure. Security experts have raised concerns that the timing of the exploitation coincides with holiday weekends, a tactic often employed by attackers to take advantage of reduced security team availability.

Patch Status

Fortinet has released emergency hotfixes for both affected versions on April 4, 2026. The upcoming FortiClient EMS version 7.4.7 is expected to include a permanent fix. Users are strongly urged to apply these hotfixes immediately to mitigate the risk of exploitation. Fortinet has observed that the vulnerability is being actively exploited in the wild, further emphasizing the urgency for users to update their systems.

Immediate Actions

Organizations running vulnerable versions of FortiClient EMS should prioritize the application of the emergency hotfixes. Detailed installation instructions can be found in the official FortiClient EMS release notes. Additionally, it is recommended to monitor EMS logs for any anomalous API activity, especially unauthenticated requests that may indicate prior exploitation attempts. Restricting external access to the EMS management interface can also provide an additional layer of defense while patching is completed. Given the critical nature of this vulnerability, organizations should treat this as an emergency response situation.

Context and Implications

The development comes shortly after another critical vulnerability in FortiClient EMS (CVE-2026-21643) was reported, raising concerns about the security posture of the FortiClient product line. The rapid succession of these vulnerabilities suggests a potentially systemic issue that organizations must address with urgency. Security experts have noted that the exploitation of CVE-2026-35616 may not be isolated, as it remains unclear whether the same threat actor is behind both vulnerabilities, leading to speculation about coordinated attacks against Fortinet products. This incident underscores the need for organizations to remain vigilant and proactive in their cybersecurity measures.

The exploitation of CVE-2026-35616 highlights a concerning trend in the frequency of critical vulnerabilities within Fortinet's product line, necessitating a thorough review of security practices for organizations relying on FortiClient EMS.

Original article from

CSCyber Security News· Guru Baran
Read Full Article

Also covered by

HEHelp Net Security

FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)

Read Article
THThe Hacker News

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Read Article

Related Pings

HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·
HIGHVulnerabilities

Broken Access Control - High Risk in Open WebUI Discovered

A serious vulnerability has been found in Open WebUI, allowing low-privileged users to access sensitive data. This flaw, CVE-2026-34222, poses a high risk. Users must update to the latest version to secure their systems.

Full Disclosure·