HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🔴 Critical🛡️ Vulnerability

Critical Pre‑Auth API Bypass in FortiClient EMS (CVE‑2026‑35616) Actively Exploited

Fortinet disclosed CVE‑2026‑35616, a critical pre‑authentication API access bypass in FortiClient EMS (CVSS 9.1) that is already being leveraged by threat actors. The flaw allows unauthenticated attackers to execute commands and elevate privileges, putting endpoint management infrastructure at risk. TPRM teams must verify patch status across all managed third‑party environments.

🛡️ LiveThreat™ Intelligence · 📅 April 06, 2026· 📰 securityaffairs.com
🔴
Severity
Critical
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
securityaffairs.com

Critical Pre‑Auth API Bypass in FortiClient EMS (CVE‑2026‑35616) Actively Exploited – Urgent Patch Required

What It Is – Fortinet disclosed CVE‑2026‑35616, a critical improper‑access‑control flaw (CWE‑284) in FortiClient EMS that lets an unauthenticated attacker bypass authentication via a pre‑auth API and execute arbitrary commands.

Exploitability – The vulnerability is actively exploited in the wild; Fortinet observed exploitation and released out‑of‑band patches. CVSS 9.1 (Critical).

Affected Products – FortiClient EMS 7.4.5 and 7.4.6 (hotfixes available); permanent fix slated for 7.4.7.

TPRM Impact – The EMS platform is often deployed by MSPs and large enterprises to manage thousands of endpoints. A compromised EMS server can become a foothold for lateral movement, data exfiltration, or ransomware across multiple third‑party environments.

Recommended Actions

  • Deploy the FortiClient EMS hotfixes for 7.4.5 and 7.4.6 immediately.
  • Verify patch status on all managed endpoints and EMS servers.
  • Enable strict API logging and monitor for anomalous pre‑auth calls.
  • Segment EMS infrastructure from critical assets and enforce least‑privilege network zones.
  • Subscribe to Fortinet’s threat‑intel feeds for IOCs related to this exploit.

Source: SecurityAffairs – CVE‑2026‑35616 Fortinet fixes actively exploited high‑severity flaw

📰 Original Source
https://securityaffairs.com/190392/hacking/cve-2026-35616-fortinet-fixes-actively-exploited-high-severity-flaw.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.