HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Zero‑Day in FortiClient Endpoint Management Server (CVE‑2026‑35616) Actively Exploited, Threatening Enterprise Endpoint Security

Fortinet disclosed a critical zero‑day (CVE‑2026‑35616) in FortiClient EMS that allows unauthenticated attackers to execute arbitrary code. The flaw is already being weaponised, with thousands of exposed servers worldwide, raising urgent TPRM concerns for any organization relying on FortiClient for endpoint protection or Zero‑Trust networking.

LiveThreat™ Intelligence · 📅 April 07, 2026· 📰 databreachtoday.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
databreachtoday.com

Zero‑Day in FortiClient Endpoint Management Server (CVE‑2026‑35616) Actively Exploited, Threatening Enterprise Endpoint Security

What Happened — Fortinet disclosed a critical zero‑day vulnerability (CVE‑2026‑35616) in its FortiClient Endpoint Management Server (EMS) that allows unauthenticated attackers to bypass authentication and execute arbitrary code. The flaw is already being weaponised in the wild, prompting an emergency hot‑fix for EMS 7.4.5/7.4.6.

Why It Matters for TPRM

  • The vulnerability resides in a core security‑fabric component that many third‑party vendors embed in their products.
  • Active exploitation means compromised EMS servers can become launch pads for lateral movement across a supply‑chain.
  • Unpatched EMS instances have been observed globally (≈2,000 exposed hosts), increasing the risk of data loss or service disruption for downstream customers.

Who Is Affected

  • Enterprises across all sectors that rely on FortiClient EMS for endpoint protection, VPN, and Zero‑Trust network access.
  • Managed Service Providers (MSPs) and MSSPs that deploy FortiClient on behalf of clients.

Recommended Actions

  • Verify that all FortiClient EMS installations are running version 7.4.5/7.4.6 or have applied the emergency hot‑fix.
  • Conduct an inventory of exposed EMS servers (internet‑facing IPs, mis‑configurations).
  • Accelerate patching of the related CVE‑2026‑21643 (also actively exploited).
  • Review third‑party contracts for security‑fabric dependencies and enforce timely remediation clauses.

Technical Notes — The zero‑day (CVE‑2026‑35616) is a remote code execution flaw triggered by crafted HTTP requests, bypassing authentication and authorization. It co‑exists with a high‑severity SQL‑injection/remote‑code flaw (CVE‑2026‑21643, CVSS 9.1). Both are being exploited in the wild; threat intel from Defused and Shadowserver confirms active probing and exploitation. Source: DataBreachToday

📰 Original Source
https://www.databreachtoday.com/attackers-target-zero-day-flaw-in-fortinet-security-software-a-31344

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.