VulnerabilitiesCRITICAL

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

Featured image for Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited
#CVE-2026-35616#FortiClient EMS#Fortinet#API vulnerability#zero-day#FortiClient#vulnerability#API security#patch management

Original Reporting

CSCyber Security News·Guru Baran

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelCRITICAL

Active exploitation or massive impact — immediate action required

🛡️
🛡️ VULNERABILITY DETAILS
CVE ID
CVSS Score
Severity Rating
Affected Product
Vendor
Vulnerability Type
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Actively Exploited
Patch Available
Workaround Available
🎯

There's a serious flaw in Fortinet's software that lets bad guys sneak in without a password. They found out about it recently, and now everyone needs to fix their software quickly to stay safe.

Quick Summary

Fortinet has confirmed a critical zero-day vulnerability in FortiClient EMS, allowing unauthenticated attackers to bypass API authentication. Immediate patching is urged as exploitation attempts escalate.

The Flaw

Fortinet has confirmed a critical zero-day vulnerability in FortiClient EMS, tracked as CVE-2026-35616, with a CVSSv3 score of 9.1. This vulnerability allows unauthenticated attackers to bypass API authentication and authorization controls, enabling them to execute arbitrary code or commands on vulnerable systems. Classified under CWE-284 (Improper Access Control), the flaw resides in the API layer of FortiClient Endpoint Management Server (EMS). Notably, the vulnerability has been described as a pre-authentication API access bypass leading to privilege escalation. The vulnerability was discovered by the cybersecurity firm Defused, which responsibly disclosed it to Fortinet after observing in-the-wild exploitation. Fortinet has confirmed that this flaw has been actively exploited since at least March 31, 2026.

What's at Risk

The vulnerability affects FortiClient EMS versions 7.4.5 and 7.4.6, while version 7.2.x remains unaffected. Successful exploitation can lead to privilege escalation, compromising the confidentiality, integrity, and availability of the affected systems. Exploitation attempts were first recorded against honeypots on March 31, 2026, indicating a rapid escalation in threat activity leading up to the public disclosure. Security experts have raised concerns that the timing of the exploitation coincides with holiday weekends, a tactic often employed by attackers to take advantage of reduced security team availability. Additionally, the Shadowserver Foundation reports that over 2,000 FortiClient EMS instances are accessible from the internet, with the majority located in the USA and Germany, heightening the risk of attacks exploiting this vulnerability. Furthermore, Defused has reported that another vulnerability, CVE-2026-21643, was also being exploited in the wild as early as March 24, 2026, raising concerns about a coordinated attack strategy. The US Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its KEV Catalog on April 6, 2026, setting a deadline for federal agencies to apply the patch.

Patch Status

Fortinet released emergency hotfixes for both affected versions on April 4, 2026. Users are strongly urged to apply these hotfixes immediately to mitigate the risk of exploitation. Fortinet has observed that the vulnerability is being actively exploited in the wild, further emphasizing the urgency for users to update their systems. Detailed instructions on how to download and apply the hotfixes, as well as how to verify that they have been applied, are available in Fortinet's advisory. Notably, Arctic Wolf has not identified a publicly available proof-of-concept exploit for CVE-2026-35616, which may indicate that attackers are still developing their methods for exploitation. The upcoming FortiClient EMS version 7.4.7 is expected to include a permanent fix.

Immediate Actions

Organizations running vulnerable versions of FortiClient EMS should prioritize the application of the emergency hotfixes. Detailed installation instructions can be found in the official FortiClient EMS release notes. Additionally, it is recommended to monitor EMS logs for any anomalous API activity, especially unauthenticated requests that may indicate prior exploitation attempts. Restricting external access to the EMS management interface can also provide an additional layer of defense while patching is completed. Given the critical nature of this vulnerability, organizations should treat this as an emergency response situation.

Context and Implications

The development comes shortly after another critical vulnerability in FortiClient EMS (CVE-2026-21643) was reported, raising concerns about the security posture of the FortiClient product line. The rapid succession of these vulnerabilities suggests a potentially systemic issue that organizations must address with urgency. Security experts have noted that the exploitation of CVE-2026-35616 may not be isolated, as it remains unclear whether the same threat actor is behind both vulnerabilities, leading to speculation about coordinated attacks against Fortinet products. This incident underscores the need for organizations to remain vigilant and proactive in their cybersecurity measures. Additionally, the relatively small internet-facing footprint of FortiClient EMS, estimated at about 100 exposed instances, could mitigate some risk, but the potential for targeted attacks remains high.

Pro Insight

The rapid escalation of exploitation attempts and the addition of this vulnerability to CISA's KEV Catalog highlight the urgency for organizations to patch their systems without delay.

🗓️ Story Timeline

Story broke by Cyber Security News
Covered by Help Net Security
Covered by The Hacker News
Covered by BleepingComputer
Covered by Cyber Security News
Covered by Security Affairs
Covered by SecurityWeek
Covered by Cybersecurity Dive
Covered by Tenable Blog
Covered by CISA Advisories
Covered by SC Media
Covered by The Register Security
Covered by CyberWire Daily
Covered by Arctic Wolf Blog
Covered by Dark Reading
Covered by CyberScoop
Covered by Infosecurity Magazine
Covered by Canadian Cyber Centre Alerts

Sources

Original Report

CSCyber Security News· Guru Baran
Read Original

Also covered by

HEHelp Net Security

FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)

Read
THThe Hacker News

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

Read
BLBleepingComputer

New FortiClient EMS flaw exploited in attacks, emergency patch released

Read
CYCyber Security News

2,000+ FortiClient EMS Instances Exposed Online Amid Active RCE Vulnerability Exploits in the Wild

Read
SESecurity Affairs

CVE-2026-35616: Fortinet fixes actively exploited high-severity flaw

Read
SESecurityWeek
·Ionut Arghire

Fortinet Rushes Emergency Fixes for Exploited Zero-Day

Read
CYCybersecurity Dive

Critical flaw in FortiClient EMS under exploitation

Read
TETenable Blog

CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild

Read
CICISA Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

Read
SCSC Media

Fortinet issues Easter weekend hotfix for FortiClient EMS

Read
THThe Register Security

Attackers exploited this critical FortiClient EMS bug as a 0-day

Read
CYCyberWire Daily

Patching can't wait.

Read
ARArctic Wolf Blog

CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS

Read
DADark Reading

Fortinet Issues Emergency Patch for FortiClient Zero-Day

Read
CYCyberScoop

Fortinet customers confront actively exploited zero-day, with a full patch still pending

Read
INInfosecurity Magazine

Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploited

Read
CACanadian Cyber Centre Alerts

Fortinet security advisory (AV26-313)

Read

Related Pings

CRITICALVulnerabilities

Ninja Forms - Critical Flaw Allows Remote Code Execution

A critical flaw in the Ninja Forms plugin for WordPress allows attackers to upload harmful files. With over 600,000 downloads, users must update immediately to avoid exploitation.

BleepingComputer·
CRITICALVulnerabilities

VMware Security Advisory - Critical Vulnerabilities Identified

VMware has issued a critical security advisory for its Tanzu products, urging immediate updates. Affected versions prior to MySQL for Kubernetes 2.0.2 must be patched. Don't risk security vulnerabilities!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Erlang Security Advisory - Critical Vulnerabilities Addressed

Erlang's latest security advisory reveals critical vulnerabilities in its software. Users must update to secure versions to protect their systems from potential exploits. Don't delay in applying these necessary fixes!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Microsoft Edge - Critical Security Advisory Released

Microsoft has released a critical security advisory for Edge due to a vulnerability that could be exploited. Users are urged to update immediately. Mozilla has also issued advisories for Firefox vulnerabilities.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Severe StrongBox Vulnerability Patched in Android Update

Android has patched a critical DoS vulnerability and a high-severity flaw in StrongBox. These issues could disrupt services and expose sensitive data. Users should update their devices immediately.

SecurityWeek·
CRITICALVulnerabilities

Android Zero-Interaction Vulnerability - Critical DoS Risk

A critical Android vulnerability allows for zero-interaction denial-of-service attacks, affecting millions. Users must update their devices immediately.

Cyber Security News·