{"id":45193,"date":"2026-04-07T23:04:29","date_gmt":"2026-04-07T15:04:29","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/fortinet-releases-emergency-patch-after-forticlient-ems-bug-is-exploit-infosecurity-magazine\/"},"modified":"2026-04-07T23:04:29","modified_gmt":"2026-04-07T15:04:29","slug":"fortinet-releases-emergency-patch-after-forticlient-ems-bug-is-exploit-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/07\/fortinet-releases-emergency-patch-after-forticlient-ems-bug-is-exploit-infosecurity-magazine\/","title":{"rendered":"Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploit &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>Fortinet customers have been urged to update their FortiClient&nbsp;Enterprise Management Server (EMS)&nbsp;products after the vendor was forced to issue an emergency patch over the weekend.<\/p>\n<p>CVE-2026-35616 is a critical (CVSS 9.1) improper access control vulnerability which could allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.<\/p>\n<p>&ldquo;Fortinet has observed this to be exploited in the wild and urges vulnerable customers to install the hotfix for FortiClient EMS 7.4.5 and 7.4.6,&rdquo; the vendor <a href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Ffortiguard.fortinet.com%2Fpsirt%2FFG-IR-26-099&amp;data=05%7C02%7Cbeth.maundrill%40rxglobal.com%7Cbc43ef9b21cc48a150c708de94847210%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C639111493779099622%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=ksWxPWNVisStxxov4kIeKYbdVOvMGUT7ZyAnbL6P58E%3D&amp;reserved=0\">said<\/a>. &ldquo;Upcoming FortiClientEMS 7.4.7 will also include a fix for this issue. In the meantime, the hotfix above is sufficient to prevent it entirely.&rdquo;<\/p>\n<p><em><a href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.infosecurity-magazine.com%2Fnews%2Ffortinet-exploit-code-available%2F&amp;data=05%7C02%7Cbeth.maundrill%40rxglobal.com%7Cbc43ef9b21cc48a150c708de94847210%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C639111493779187725%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=l83g%2BF6z%2FFzegpBj2evRzUbsvr4KXWkAhJZAgGVKqyM%3D&amp;reserved=0\">Read more on Fortinet vulnerabilities: Fortinet Warns Exploit Code Available for Critical Vulnerability<\/a><\/em><\/p>\n<p>Cybersecurity vendor Defused explained that it had seen the vulnerability being exploited in zero-day attacks earlier last week and notified Fortinet accordingly.<\/p>\n<p>&ldquo;The vulnerability allows an unauthenticated attacker to bypass API authentication and authorization entirely, unauthorized code or commands via crafted requests,&rdquo; Defused&nbsp;said in a social media post.<\/p>\n<h2><strong>Second Critical Flaw in a Week<\/strong><\/h2>\n<p>Defused also discovered another critical vulnerability in the FortiClient EMS platform last week, also being exploited in the wild.<\/p>\n<p><a href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2026-21643&amp;data=05%7C02%7Cbeth.maundrill%40rxglobal.com%7Cbc43ef9b21cc48a150c708de94847210%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C639111493779260388%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=OwvDBxPrvdoS3dOOXiL5jzpjvYlzw72kQowxpueisqM%3D&amp;reserved=0\">CVE-2026-21643<\/a> is an SQL injection flaw with a CVSS score of 9.8 which could allow unauthenticated attackers to execute unauthorized code via specifically crafted HTTP requests.<\/p>\n<p>By hijacking organizations&rsquo; endpoint management infrastructure, threat actors could push malicious updates to endpoints and launch deeper attacks into cloud systems, for possible espionage and ransomware.<\/p>\n<p>For that specific vulnerability, customers were urged to upgrade to <a href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Ffortiguard.fortinet.com%2Fpsirt%2FFG-IR-25-1142&amp;data=05%7C02%7Cbeth.maundrill%40rxglobal.com%7Cbc43ef9b21cc48a150c708de94847210%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C639111493779333349%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=AynwcV3yEkFTnAbVcjxuiFrDTVj8OqXXd3s70eUriuw%3D&amp;reserved=0\">version 7.4.5<\/a> or later, or at least disconnect the administrative web interface from the internet. Indicators of compromise (IoCs) included HTTP 500 errors on the \/api\/v1\/init_consts endpoint; unusual database error messages in PostgreSQL logs; and unauthorized remote monitoring and management tools.<\/p>\n<p>Endpoint management solutions are a popular target for threat actors given the access they provide to company device fleets. This can be weaponized in ransomware, cyber espionage or &nbsp;destructive attacks.<\/p>\n<p>In 2024, Fortinet <a href=\"https:\/\/nam11.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.infosecurity-magazine.com%2Fnews%2Ffortinet-patches-critical-bug%2F&amp;data=05%7C02%7Cbeth.maundrill%40rxglobal.com%7Cbc43ef9b21cc48a150c708de94847210%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C639111493779432611%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=qTBVj6xz6xzUf1HKon%2FVO03ueZtCUXaiCpRXz%2FZc2Gg%3D&amp;reserved=0\">was forced to patch<\/a> a critical SQL injection vulnerability in FortiClientEMS which could have enabled remote code execution (RCE) on targeted servers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fortinet customers have been urged to update their Fort [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-45193","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45193"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45193\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}