{"id":45150,"date":"2026-04-06T22:48:17","date_gmt":"2026-04-06T14:48:17","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/06\/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday\/"},"modified":"2026-04-06T22:48:17","modified_gmt":"2026-04-06T14:48:17","slug":"cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/06\/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday\/","title":{"rendered":"CISA orders feds to patch exploited Fortinet EMS flaw by Friday"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/01\/13\/CISA--headpic.jpg\" width=\"1600\" alt=\"CISA orders feds to patch exploited Fortinet EMS flaw by Friday\"><\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered federal agencies to secure FortiClient Enterprise Management Server (EMS) instances against an actively exploited vulnerability by Friday.<\/p>\n<p>Tracked as CVE-2026-35616, this security flaw was discovered by cybersecurity firm Defused, which described it as a pre-authentication API access bypass that can allow attackers to bypass authentication and authorization controls entirely.<\/p>\n<p>Fortinet <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">released emergency hotfixes<\/a> over the weekend to address the vulnerability and said the security issue stems from an improper access control weakness that unauthenticated attackers can exploit to execute code or commands via specially crafted requests.<\/p>\n<p>The company also warned that threat actors had been exploiting it in zero-day attacks and warned IT administrators to secure their EMS instances as soon as possible by applying the hotfixes or upgrading to FortiClient EMS version 7.4.7 when it becomes available.<\/p>\n<p>&#8220;Fortinet has observed this to be exploited in the wild and urges vulnerable customers to install the hotfix for FortiClient EMS 7.4.5 and 7.4.6,&#8221; the company said.<\/p>\n<p>Internet security watchdog group Shadowserver currently <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/iot-devices\/time-series\/?date_range=365&amp;vendor=fortinet&amp;type=security-management&amp;model=forticlient+enterprise+management+server+%28ems%29&amp;dataset=count&amp;limit=100&amp;group_by=geo&amp;stacking=stacked\" target=\"_blank\" rel=\"nofollow noopener\">tracks nearly 2,000 FortiClient EMS instances<\/a> exposed online, with more than 1,400 IPs in the United States and in Europe. However, there are no details on how many have already been patched or have vulnerable configurations.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"316\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1109292\/2026\/FortiClient%20EMS%20instances%20exposed%20online.jpg\" width=\"700\" alt=\"CISA orders feds to patch exploited Fortinet EMS flaw by Friday\"><figcaption><em>FortiClient EMS instances exposed online (Shadowserver)<\/em><\/figcaption><\/figure>\n<\/div>\n<p>&#8203;&#8203;On Monday, CISA <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/04\/06\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"nofollow noopener\">added<\/a> CVE-2026-35616 to its <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-35616\" target=\"_blank\" rel=\"nofollow noopener\">Known Exploited Vulnerabilities (KEV) Catalog<\/a> and ordered Federal Civilian Executive Branch (FCEB) agencies to patch FortiClient EMS instances by Thursday midnight, April 9, as mandated by <a href=\"https:\/\/www.cisa.gov\/binding-operational-directive-22-01\" target=\"_blank\" rel=\"nofollow noopener\">Binding Operational Directive (BOD) 22-01<\/a>.<\/p>\n<p>&#8220;This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,&#8221; the cybersecurity agency warned.<\/p>\n<p>&#8220;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&#8221;<\/p>\n<p>Even though BOD 22-01 applies only to U.S. federal agencies, CISA urged all defenders (including those in the private sector) to prioritize patching for CVE-2026-35616 and secure their organizations&#8217; networks as soon as possible.<\/p>\n<p>Fortinet patched another critical FortiClient EMS flaw (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-21643<\/a>) in February, which was also flagged less than two weeks&nbsp;ago <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">as exploited in attacks<\/a>.<\/p>\n<p>Fortinet vulnerabilities are often exploited in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-infect-dutch-military-network-with-malware\/\" target=\"_blank\" rel=\"nofollow noopener\">cyber espionage<\/a> campaigns and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-cring-ransomware-hits-unpatched-fortinet-vpn-devices\/\" target=\"_blank\" rel=\"nofollow noopener\">ransomware attacks<\/a> (often as zero-day bugs) to breach corporate networks. Most recently, Fortinet blocked FortiCloud SSO connections from devices running vulnerable firmware versions to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fortinet-blocks-exploited-forticloud-sso-zero-day-until-patch-is-ready\/\" target=\"_blank\" rel=\"nofollow noopener\">mitigate CVE-2026-24858 zero-day attacks<\/a>.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"CISA orders feds to patch exploited Fortinet EMS flaw by Friday\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks\/\">New FortiClient EMS flaw exploited in attacks, emergency patch released<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks\/\">Critical Fortinet Forticlient EMS flaw now exploited in attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows\/\">CISA: New Langflow flaw actively exploited to hijack AI workflows<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday\/\">CISA orders feds to patch max-severity Cisco flaw by Sunday<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/wordpress-membership-plugin-bug-exploited-to-create-admin-accounts\/\">WordPress membership plugin bug exploited to create admin accounts<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45150","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45150"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45150\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}