{"id":497,"date":"2026-04-05T06:55:26","date_gmt":"2026-04-05T06:55:26","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=497"},"modified":"2026-04-05T06:55:26","modified_gmt":"2026-04-05T06:55:26","slug":"fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=497","title":{"rendered":"Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 05, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ API Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh61_DDvLhdLZ8tHMrmQ8XlQ1vWwnEk-2lmYFnjw_1ZvJ4IUB4G7ffXU8pSd7JDknP0bqyaVVOTb1HJ62ujlQ_zfG3Lc7XMtLKUuZTO6v4jgrdqon90wrix6EaQNKtou3yz7Txf3ni5JOVn-D1-OcHB7e-UDxQI2ifZOBHAeDwFBnwAfanSeFn8EyP8oilj\/s1700-e365\/fortinet.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the\u00a0wild.<\/p>\n<p>The\u00a0vulnerability, tracked\u00a0as <strong>CVE-2026-35616<\/strong> (CVSS score: 9.1), has been described as a pre-authentication API access bypass leading to privilege escalation.<\/p>\n<p>\u00abAn improper access control vulnerability [CWE-284] in FortiClient EMS may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests,\u00bb\u00a0Fortinet <a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-26-099\">said<\/a> in a Saturday\u00a0advisory.<\/p>\n<p>The\u00a0issue affects FortiClient EMS versions 7.4.5\u00a0through 7.4.6. It&#8217;s expected to be fully patched in the upcoming version 7.4.7, although the company\u00a0has <a href=\"https:\/\/docs.fortinet.com\/document\/forticlient\/7.4.5\/ems-release-notes\/832484\">released a\u00a0hotfix<\/a> to address\u00a0it.\u00a0<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Simo\u00a0Kohonen from Defused Cyber and Nguyen Duc Anh have been credited with discovering and reporting the flaw. In\u00a0a post on X, Defused\u00a0Cyber <a href=\"https:\/\/x.com\/DefusedCyber\/status\/2040315969159995847\">said<\/a> it observed zero-day exploitation of CVE-2026-35616 earlier this week. According to watchTowr, exploitation attempts against CVE-2026-35616 were first recorded against its honeypots on March 31,\u00a02026.<\/p>\n<p>Successful exploitation of the flaw could allow an unauthenticated attacker to sidestep API authentication and authorization protections, and execute malicious code or commands via crafted\u00a0requests.\u00a0<\/p>\n<p>\u00abFortinet has observed this to be exploited in the wild and urges vulnerable customers to install the hotfix for FortiClient EMS 7.4.5\u00a0and 7.4.6,\u00bb the company\u00a0added.<\/p>\n<p>The\u00a0development comes merely days after\u00a0another recently-patched, critical vulnerability in FortiClient EMS\u00a0(CVE-2026-21643, CVSS score: 9.1) came under active exploitation. It&#8217;s currently not known if the same threat actor is behind the exploitation of both the flaws, and if they are being weaponized\u00a0together.<\/p>\n<p>Given\u00a0the severity of the vulnerabilities, users are advised to update their FortiClient EMS to the latest version as soon as\u00a0possible.<\/p>\n<p>\u00abThe timing of the ramp-up of in-the-wild exploitation of this zero-day is likely not coincidental,\u00bb watchTowr CEO and founder Benjamin Harris told The Hacker\u00a0News.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abAttackers have shown repeatedly that holiday weekends are the best time to move. Security teams are at half strength, on-call engineers are distracted, and the window between compromise and detection stretches from hours to days. Easter, like any other holiday, represents opportunity.\u00bb<\/p>\n<p>\u00abWhat is disappointing is the bigger picture. This\u00a0is the second unauthenticated vulnerability in FortiClient EMS in a matter of\u00a0weeks.\u00bb<\/p>\n<p>\u00abSo, once again, organizations running FortiClient EMS and exposed to the Internet should treat this as an emergency response situation, not something to pick up on Tuesday morning. Apply\u00a0the hotfix. Attackers already have a head\u00a0start.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 05, 2026Vulnerability \/ API Security Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the\u00a0wild. The\u00a0vulnerability, tracked\u00a0as&hellip;<\/p>\n","protected":false},"author":1,"featured_media":498,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[201,1076,1078,128,1077,1075,57],"class_list":["post-497","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-actively","tag-cve202635616","tag-ems","tag-exploited","tag-forticlient","tag-fortinet","tag-patches"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=497"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/497\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/498"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}