VulnerabilitiesHIGH

CVE-2026-35616 - New Exploited Vulnerability Added by CISA

#CVE-2026-35616#Fortinet#FortiClient EMS#CISA#BOD 22-01

Original Reporting

CICISA Advisories·CISA

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🎯

Basically, a new security flaw in Fortinet software is being actively exploited, and CISA warns organizations to fix it quickly.

Quick Summary

CISA has added a new vulnerability, CVE-2026-35616, to its catalog due to active exploitation. This flaw in Fortinet software poses significant risks to organizations. Timely remediation is essential to safeguard systems against attacks.

The Flaw

CISA has officially added CVE-2026-35616 to its Known Exploited Vulnerabilities (KEV) Catalog. This vulnerability affects Fortinet FortiClient EMS and is categorized as an Improper Access Control Vulnerability. Such vulnerabilities are often targeted by malicious actors, making them a significant risk for organizations, particularly in the federal sector.

What's at Risk

The presence of this vulnerability in the KEV Catalog indicates that it is currently being exploited in the wild. Organizations that use Fortinet products may find themselves at increased risk of cyberattacks, potentially leading to unauthorized access to sensitive data or systems.

Patch Status

As per Binding Operational Directive (BOD) 22-01, federal agencies are required to remediate identified vulnerabilities by specified deadlines. While this directive primarily applies to Federal Civilian Executive Branch (FCEB) agencies, CISA strongly encourages all organizations to prioritize the remediation of vulnerabilities listed in the KEV Catalog. This approach is crucial for reducing exposure to cyber threats.

Immediate Actions

Organizations should take the following steps to mitigate risks associated with this vulnerability:

  • Assess systems for the presence of Fortinet FortiClient EMS.
  • Implement necessary patches or updates as soon as they become available.
  • Monitor networks for any signs of exploitation related to CVE-2026-35616.

By prioritizing these actions, organizations can enhance their security posture and protect against potential attacks stemming from this newly identified vulnerability.

Pro Insight

🔒 Pro insight: The addition of CVE-2026-35616 to the KEV Catalog underscores the urgency for organizations to adopt proactive vulnerability management practices.

Sources

Original Report

CICISA Advisories· CISA
Read Original

Related Pings

HIGHVulnerabilities

CrowdStrike Accelerates Exposure Evaluation Amid Rising Threats

CrowdStrike has launched Continuous Visibility to enhance vulnerability evaluations. This allows organizations to respond faster to emerging threats, reducing the risk of exploitation. With this tool, security teams can act swiftly and confidently.

CrowdStrike Blog·
MEDIUMVulnerabilities

is-localhost-ip 2.0.0 - SSRF Vulnerability Discovered

A new SSRF vulnerability in is-localhost-ip 2.0.0 has been discovered. This flaw could allow attackers to access sensitive internal data. Users should isolate the software and monitor for updates.

Exploit-DB·
CRITICALVulnerabilities

ASP.NET 8.0.10 - Critical Bypass Vulnerability Discovered

A critical vulnerability in ASP.NET 8.0.10 allows attackers to bypass authentication and hijack sessions. Immediate patching is crucial to secure affected systems.

Exploit-DB·
HIGHVulnerabilities

WordPress Madara - Local File Inclusion Vulnerability Alert

A Local File Inclusion vulnerability in WordPress Madara threatens user data. This affects all sites using the theme. Immediate action is necessary to prevent data breaches.

Exploit-DB·
HIGHVulnerabilities

Zhiyuan OA - Critical Arbitrary File Upload Vulnerability

A critical vulnerability in Zhiyuan OA allows arbitrary file uploads, posing a risk of remote code execution. Multiple software versions are affected. Immediate patching is essential to prevent exploitation.

Exploit-DB·
CRITICALVulnerabilities

Dgraph Database Vulnerability - Attackers Bypass Authentication

A critical vulnerability in Dgraph allows attackers to bypass authentication and access sensitive data. Organizations using Dgraph must isolate their databases to prevent exploitation. Immediate action is essential to mitigate risks.

Cyber Security News·