{"id":45140,"date":"2026-04-05T20:59:30","date_gmt":"2026-04-05T12:59:30","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/05\/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems\/"},"modified":"2026-04-05T20:59:30","modified_gmt":"2026-04-05T12:59:30","slug":"fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/05\/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems\/","title":{"rendered":"Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh61_DDvLhdLZ8tHMrmQ8XlQ1vWwnEk-2lmYFnjw_1ZvJ4IUB4G7ffXU8pSd7JDknP0bqyaVVOTb1HJ62ujlQ_zfG3Lc7XMtLKUuZTO6v4jgrdqon90wrix6EaQNKtou3yz7Txf3ni5JOVn-D1-OcHB7e-UDxQI2ifZOBHAeDwFBnwAfanSeFn8EyP8oilj\/s1600\/fortinet.jpg\" style=\"clear: left; display: block; float: left; padding: 1em 0px; text-align: center;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh61_DDvLhdLZ8tHMrmQ8XlQ1vWwnEk-2lmYFnjw_1ZvJ4IUB4G7ffXU8pSd7JDknP0bqyaVVOTb1HJ62ujlQ_zfG3Lc7XMtLKUuZTO6v4jgrdqon90wrix6EaQNKtou3yz7Txf3ni5JOVn-D1-OcHB7e-UDxQI2ifZOBHAeDwFBnwAfanSeFn8EyP8oilj\/s16000\/fortinet.jpg\" title=\"FortiClient EMS\" alt=\"Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS\" \/><\/a><\/div>\n<p>Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the&nbsp;wild.<\/p>\n<p>The&nbsp;vulnerability, tracked&nbsp;as <strong>CVE-2026-35616<\/strong> (CVSS score: 9.1), has been described as a pre-authentication API access bypass leading to privilege escalation.<\/p>\n<p>&#8220;An improper access control vulnerability [CWE-284] in FortiClient EMS may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests,&#8221;&nbsp;Fortinet <a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-26-099\">said<\/a> in a Saturday&nbsp;advisory.<\/p>\n<p>The&nbsp;issue affects FortiClient EMS versions 7.4.5&nbsp;through 7.4.6. It&#8217;s expected to be fully patched in the upcoming version 7.4.7, although the company&nbsp;has <a href=\"https:\/\/docs.fortinet.com\/document\/forticlient\/7.4.5\/ems-release-notes\/832484\">released a&nbsp;hotfix<\/a> to address&nbsp;it.&nbsp;<\/p>\n<p>Simo&nbsp;Kohonen from Defused Cyber and Nguyen Duc Anh have been credited with discovering and reporting the flaw. In&nbsp;a post on X, Defused&nbsp;Cyber <a href=\"https:\/\/x.com\/DefusedCyber\/status\/2040315969159995847\">said<\/a> it observed zero-day exploitation of CVE-2026-35616 earlier this week. According to watchTowr, exploitation attempts against CVE-2026-35616 were first recorded against its honeypots on March 31,&nbsp;2026.<\/p>\n<p>Successful exploitation of the flaw could allow an unauthenticated attacker to sidestep API authentication and authorization protections, and execute malicious code or commands via crafted&nbsp;requests.&nbsp;<\/p>\n<p>&#8220;Fortinet has observed this to be exploited in the wild and urges vulnerable customers to install the hotfix for FortiClient EMS 7.4.5&nbsp;and 7.4.6,&#8221; the company&nbsp;added.<\/p>\n<p>The&nbsp;development comes merely days after&nbsp;another recently-patched, critical vulnerability in FortiClient EMS&nbsp;(<a href=\"https:\/\/thehackernews.com\/2026\/03\/weekly-recap-telecom-sleeper-cells-llm.html#:~:text=Fortinet%20FortiClient%20EMS%20Flaw%20Comes%20Under%20Attack\">CVE-2026-21643<\/a>, CVSS score: 9.1) came under active exploitation. It&#8217;s currently not known if the same threat actor is behind the exploitation of both the flaws, and if they are being weaponized&nbsp;together.<\/p>\n<p>Given&nbsp;the severity of the vulnerabilities, users are advised to update their FortiClient EMS to the latest version as soon as&nbsp;possible.<\/p>\n<p>&#8220;The timing of the ramp-up of in-the-wild exploitation of this zero-day is likely not coincidental,&#8221; watchTowr CEO and founder Benjamin Harris told The Hacker&nbsp;News.<\/p>\n<p>&#8220;Attackers have shown repeatedly that holiday weekends are the best time to move. Security teams are at half strength, on-call engineers are distracted, and the window between compromise and detection stretches from hours to days. Easter, like any other holiday, represents opportunity.&#8221;<\/p>\n<p>&#8220;What is disappointing is the bigger picture. This&nbsp;is the second unauthenticated vulnerability in FortiClient EMS in a matter of&nbsp;weeks.&#8221;<\/p>\n<p>&#8220;So, once again, organizations running FortiClient EMS and exposed to the Internet should treat this as an emergency response situation, not something to pick up on Tuesday morning. Apply&nbsp;the hotfix. Attackers already have a head&nbsp;start.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Fortinet has released out-of-band patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the&nbsp;wild.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-45140","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45140"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45140\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}