HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🔴 Critical🛡️ Vulnerability

Critical FortiClient EMS Zero-Day (CVE-2026-35616) Actively Exploited – Immediate Hotfix Required

Fortinet disclosed that its FortiClient EMS 7.4.5/7.4.6 contains a critical improper‑access‑control vulnerability (CVE‑2026‑35616) that is being exploited in the wild. The flaw permits unauthenticated attackers to execute arbitrary commands via the EMS API, posing a high‑risk supply‑chain threat for organizations that depend on FortiClient for endpoint management.

🛡️ LiveThreat™ Intelligence · 📅 April 04, 2026· 📰 helpnetsecurity.com
🔴
Severity
Critical
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
helpnetsecurity.com

FortiClient EMS Zero‑Day (CVE‑2026‑35616) Enables Unauthenticated Code Execution – Active Exploits Observed

What It Is – Fortinet’s FortiClient Endpoint Management Server (EMS) versions 7.4.5 and 7.4.6 contain an improper access‑control flaw (CVE‑2026‑35616) that bypasses API authentication, allowing unauthenticated attackers to run arbitrary commands.

Exploitability – The vulnerability is being exploited in the wild; Fortinet confirmed active attacks and released emergency hot‑fixes. CVSS v3.1 is rated 9.8 Critical (remote, unauthenticated, no user interaction).

Affected Products – FortiClient EMS 7.4.5, 7.4.6 (branch 7.2 is not affected; impact on 8.0 is unknown).

TPRM Impact – Organizations that rely on FortiClient EMS for endpoint protection face a supply‑chain risk: a compromised EMS can be used to pivot into the broader network, exfiltrate data, or disrupt critical services.

Recommended Actions

  • Deploy Fortinet’s emergency hot‑fix for EMS 7.4.5/7.4.6 immediately.
  • Verify the patch is applied across all managed endpoints and confirm version compliance.
  • Review API logs for anomalous requests and block any unauthorized IPs.
  • Accelerate migration to FortiClient EMS 7.4.7 (or later) where the issue is fully resolved.
  • Re‑assess third‑party risk contracts with Fortinet, adding clauses for rapid vulnerability disclosure and remediation.

Source: Help Net Security – FortiClient EMS zero‑day exploited, emergency hotfixes available (CVE‑2026‑35616)

📰 Original Source
https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.