HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🔴 Critical🛡️ Vulnerability

Critical Improper Access Control in Fortinet FortiClient EMS (CVE‑2026‑35616) Exploited in the Wild

Fortinet FortiClient EMS 7.4.5/7.4.6 contains a CVE‑2026‑35616 improper access‑control flaw that is being exploited in the wild. The vulnerability enables unauthenticated attackers to bypass authentication and execute commands, posing a high‑risk supply‑chain threat for organizations that deploy the endpoint manager.

🛡️ LiveThreat™ Intelligence · 📅 April 07, 2026· 📰 securityaffairs.com
🔴
Severity
Critical
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
securityaffairs.com

Critical Improper Access Control in Fortinet FortiClient EMS (CVE‑2026‑35616) Exploited in the Wild

What It Is – Fortinet FortiClient Endpoint Management Server (EMS) contains an improper access‑control flaw (CWE‑284) that lets an unauthenticated attacker bypass authentication via a crafted API request and gain elevated privileges.

Exploitability – The vulnerability (CVSS 9.1) is confirmed to be exploited in the wild; active zero‑day attacks have been observed. No public PoC is released, but threat‑intel feeds report traffic with the header X‑SSL‑CLIENT‑VERIFY: SUCCESS.

Affected Products – FortiClient EMS 7.4.5 and 7.4.6 (out‑of‑band hotfix available). A permanent fix ships in 7.4.7.

TPRM Impact

  • Endpoint‑management agents are often deployed across multiple third‑party sites; a breach can cascade to partner networks.
  • Privilege escalation on managed endpoints can expose corporate data, credentials, and internal tooling, raising supply‑chain risk.

Recommended Actions

  • Deploy the out‑of‑band hotfix for FortiClient EMS 7.4.5/7.4.6 immediately; schedule upgrade to 7.4.7.
  • Verify that API endpoints are not reachable from untrusted networks; enforce network segmentation.
  • Monitor logs for X‑SSL‑CLIENT‑VERIFY: SUCCESS or anomalous API calls.
  • Update your vulnerability management program to flag CVE‑2026‑35616 as a critical priority.
  • Communicate the remediation deadline (April 9 2026) to all affected business units and third‑party service providers.

Source: Security Affairs

📰 Original Source
https://securityaffairs.com/190425/security/u-s-cisa-adds-a-flaw-in-fortinet-forticlient-ems-to-its-known-exploited-vulnerabilities-catalog.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.