VulnerabilitiesCRITICAL

FortiClient EMS Zero-Day Vulnerability - Emergency Hotfixes Released

Featured image for FortiClient EMS Zero-Day Vulnerability - Emergency Hotfixes Released
HNHelp Net Security
CVE-2026-35616FortinetFortiClient EMS
🎯

Basically, a serious flaw in FortiClient EMS allows hackers to bypass security and run unauthorized commands.

Quick Summary

A critical zero-day vulnerability in FortiClient EMS has been exploited. Fortinet urges users to apply emergency hotfixes immediately. Failure to do so could lead to unauthorized access and control.

What Happened

A critical zero-day vulnerability has been discovered in Fortinet's FortiClient Endpoint Management Server (EMS), identified as CVE-2026-35616. This flaw allows attackers to bypass authentication and authorization controls, potentially enabling them to execute unauthorized commands. Fortinet confirmed that this vulnerability is currently being exploited in the wild, prompting an urgent response from the company.

The Flaw

CVE-2026-35616 is classified as an improper access control vulnerability. It allows unauthenticated attackers to send crafted requests that can lead to unauthorized code execution. This vulnerability affects FortiClient EMS versions 7.4.5 and 7.4.6, while the 7.2 branch remains unaffected. The company has stated that the hotfixes provided are sufficient to mitigate the risk entirely.

Patch Status

Fortinet has released emergency hotfixes for the affected versions, urging all users to install these updates immediately. The upcoming FortiClient EMS version 7.4.7 will also include a fix for this issue. However, it remains unclear whether the 8.0 branch is impacted or if this zero-day is being exploited in conjunction with other vulnerabilities.

Immediate Actions

If you are using FortiClient EMS, take the following steps:

  • Update to the latest version: Ensure you have installed the hotfixes for versions 7.4.5 and 7.4.6.
  • Monitor your systems: Watch for any unusual activity that may indicate exploitation.
  • Stay informed: Keep an eye on Fortinet’s advisories for any further updates regarding this vulnerability.

Conclusion

The discovery of CVE-2026-35616 highlights the ongoing challenges in cybersecurity, particularly regarding zero-day vulnerabilities. Organizations using FortiClient EMS must act swiftly to protect their systems from potential exploitation. Fortinet's prompt response in issuing hotfixes demonstrates the importance of timely communication and action in the face of emerging threats.

🔒 Pro insight: The rapid exploitation of CVE-2026-35616 underscores the need for proactive patch management in enterprise environments.

Original article from

HNHelp Net Security· Zeljka Zorz
Read Full Article

Related Pings

HIGHVulnerabilities

TrueConf Client Vulnerability - CISA Adds to Exploited Catalog

CISA has flagged a serious flaw in TrueConf Client, impacting secure video communications. This vulnerability could allow attackers to deliver malicious updates to government systems. Immediate action is needed to mitigate risks and protect sensitive data.

Security Affairs·
CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical 0-day vulnerability in FortiClient EMS is being exploited by attackers. Fortinet has released emergency hotfixes for affected versions. Organizations must act quickly to secure their systems.

Cyber Security News·
CRITICALVulnerabilities

Progress ShareFile Vulnerabilities - Attackers Can Take Over Servers

Critical vulnerabilities in Progress ShareFile could allow hackers to take over servers without logging in. Affected users must upgrade immediately to secure their systems. Don't wait for a breach to happen—act now!

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·