VulnerabilitiesCRITICAL

Fortinet Issues Emergency Patch for Critical FortiClient Bug

Featured image for Fortinet Issues Emergency Patch for Critical FortiClient Bug
#CVE-2026-35616#FortiClient EMS#Fortinet#zero-day#SQL injection

Original Reporting

IMInfosecurity Magazine

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelCRITICAL

Active exploitation or massive impact β€” immediate action required

πŸ›‘οΈ
πŸ›‘οΈ VULNERABILITY DETAILSCVE-2026-35616CVSS: 9.1ACTIVELY EXPLOITED
CVE IDCVE-2026-35616
CVSS Score9.1 / 10 (Critical)
Severity RatingCritical
Affected ProductFortiClient EMS 7.4.5, 7.4.6
VendorFortinet
Vulnerability TypeImproper Access Control
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Actively ExploitedYes
Patch AvailableYes
Workaround AvailableDisconnect administrative web interface from the internet
🎯

Basically, Fortinet fixed a serious flaw in their software that hackers were using to break in.

Quick Summary

Fortinet released an emergency patch for a critical vulnerability in FortiClient EMS. This flaw is actively exploited, affecting many organizations. Immediate updates are crucial to safeguard against potential attacks.

What Happened

Fortinet has issued an emergency patch for its FortiClient Enterprise Management Server (EMS) after a critical vulnerability was exploited in the wild. This flaw, identified as CVE-2026-35616, has a CVSS score of 9.1, indicating its severity. It allows unauthenticated attackers to execute unauthorized code through crafted requests, posing a significant risk to users.

Who's Affected

Organizations using FortiClient EMS versions 7.4.5 and 7.4.6 are particularly at risk. Fortinet has urged these customers to apply the hotfix immediately to prevent exploitation. The upcoming version 7.4.7 will also address this vulnerability.

What Data Was Exposed

The vulnerability permits attackers to bypass API authentication and authorization entirely. If exploited, it could lead to unauthorized access and control over the endpoint management infrastructure, enabling further attacks such as ransomware deployment or data breaches.

What You Should Do

Customers should:

  • Update FortiClient EMS to version 7.4.5 or later.
  • Monitor for indicators of compromise (IoCs) such as HTTP 500 errors on the /api/v1/init_consts endpoint and unusual database error messages in PostgreSQL logs.
  • Disconnect the administrative web interface from the internet if immediate patching is not possible.

Additional Context

This is the second critical flaw discovered in FortiClient EMS within a week. The earlier vulnerability, CVE-2026-21643, is an SQL injection flaw with a CVSS score of 9.8, which also allows unauthorized code execution through crafted HTTP requests. Such vulnerabilities highlight the increasing targeting of endpoint management solutions by threat actors, who can leverage these weaknesses to launch more extensive attacks on organizational infrastructure.

Fortinet's proactive response in releasing patches reflects the urgency of addressing these critical vulnerabilities. Organizations must remain vigilant and ensure their systems are updated to mitigate the risks associated with these exploits.

πŸ” How to Check If You're Affected

  1. 1.Check for HTTP 500 errors on the /api/v1/init_consts endpoint.
  2. 2.Review PostgreSQL logs for unusual database error messages.
  3. 3.Look for unauthorized remote monitoring and management tools.

🏒 Impacted Sectors

TechnologyAll Sectors

Pro Insight

πŸ”’ Pro insight: The rapid exploitation of CVE-2026-35616 indicates a growing trend of targeting endpoint management systems, necessitating immediate patching and monitoring.

Sources

Original Report

IMInfosecurity Magazine
Read Original

Related Pings

HIGHVulnerabilities

D-Link DIR-650IN - Authenticated Command Injection Vulnerability

A serious vulnerability in the D-Link DIR-650IN router allows low-privilege users to execute OS commands. This could lead to full device compromise, exposing sensitive data. Users should secure their routers against potential attacks.

Exploit-DBΒ·
HIGHVulnerabilities

CISA KEV Remediation Analysis - Limits of Human Security Exposed

A new analysis reveals that critical vulnerabilities are often exploited before patches can be applied. This highlights a major flaw in traditional security practices, urging organizations to rethink their vulnerability management strategies.

BleepingComputerΒ·
HIGHVulnerabilities

NetBT e-Fatura - Privilege Escalation Vulnerability Exposed

A new vulnerability in NetBT e-Fatura allows local users to escalate privileges and execute arbitrary code. This flaw poses a serious security risk, potentially compromising sensitive data. Immediate actions are needed to mitigate the threat.

Exploit-DBΒ·
HIGHVulnerabilities

Industrial Controllers Vulnerable - Cyber Conflicts Intensify

The US government warns that programmable logic controllers are under threat. Research shows 179 vulnerable devices in operational technology. This poses serious risks to critical infrastructure.

Dark ReadingΒ·
HIGHVulnerabilities

AI Router Vulnerabilities - Attackers Inject Malicious Code

A new study reveals vulnerabilities in AI routers that allow attackers to inject malicious code and steal sensitive data. This poses serious risks as AI agents handle critical tasks. Developers must implement stronger defenses against these threats.

Cyber Security NewsΒ·
HIGHVulnerabilities

Chrome 147 Patches 60 Vulnerabilities, Two Critical Flaws

Google's Chrome 147 update addresses 60 vulnerabilities, including two critical flaws in WebML. Users are urged to update to the latest version to enhance security.

SecurityWeekΒ·