Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

36 malicious npm packages exploit Redis, PostgreSQL to deploy Persistent Implant

Fortinet patch actively exploits CVE-2026-35616 in FortiClient EMS

Peter Thiel makes a big bet on solar-powered cow collars

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fortinet patch actively exploits CVE-2026-35616 in FortiClient EMS
Identity

Fortinet patch actively exploits CVE-2026-35616 in FortiClient EMS

By April 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 5, 2026Vulnerabilities/API Security

Forty Client EMS

Fortinet has released an out-of-band patch for a critical security flaw affecting FortiClient EMS and announced that the flaw is being exploited in the wild.

This vulnerability is tracked as CVE-2026-35616 (CVSS score: 9.1) and is described as a pre-authentication API access bypass leading to privilege escalation.

“Improper Access Control Vulnerability [CWE-284] “FortiClient EMS could allow an unauthenticated attacker to execute malicious code or commands via a crafted request,” Fortinet said in an advisory on Saturday.

This issue affects FortiClient EMS versions 7.4.5 through 7.4.6. The company has released a hotfix to address this, which will be fully patched in the upcoming version 7.4.7.

Simo Kohonen and Nguyen Duc Anh of Defused Cyber ​​are credited with discovering and reporting the flaw. Defused Cyber ​​said in a post to X that it observed a zero-day exploit of CVE-2026-35616 earlier this week. According to watchTowr, the first exploitation attempt against CVE-2026-35616 was recorded against that honeypot on March 31, 2026.

Successful exploitation of this flaw could allow an unauthenticated attacker to bypass API authentication and authorization protections and execute malicious code or commands via a crafted request.

“Fortinet has observed this being exploited in the wild and is urging vulnerable customers to install the FortiClient EMS 7.4.5 and 7.4.6 hotfix,” the company added.

This development comes just days after another critical vulnerability in the recently patched FortiClient EMS (CVE-2026-21643, CVSS score: 9.1) was actively exploited. It is currently unclear whether the same actor is behind the exploitation of both flaws and whether they are being weaponized together.

Given the severity of the vulnerability, users are encouraged to update FortiClient EMS to the latest version as soon as possible.

“The timing of this increase in real-world exploitation of zero-days is probably no coincidence,” watchTowr CEO and founder Benjamin Harris told Hacker News.

“Adversaries have repeatedly shown that holiday weekends are the best time to move. Security teams are at half strength, on-call engineers are distracted, and the time window between compromise and detection can stretch from hours to days. Like any holiday, Easter represents an opportunity.”

“What’s disappointing is the big picture. This is the second uncertified vulnerability in FortiClient EMS in recent weeks.”

“So, again, organizations running FortiClient EMS and exposed to the internet should treat this as an emergency response situation, not something to respond to on a Tuesday morning. Apply the hotfix. Attackers already have a head start.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePeter Thiel makes a big bet on solar-powered cow collars
Next Article 36 malicious npm packages exploit Redis, PostgreSQL to deploy Persistent Implant

Related Posts

36 malicious npm packages exploit Redis, PostgreSQL to deploy Persistent Implant

April 5, 2026

China-linked TA416 targets European governments with PlugX and OAuth-based phishing

April 3, 2026

Microsoft releases details about cookie-controlled PHP web shell persisted via Cron on Linux servers

April 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

36 malicious npm packages exploit Redis, PostgreSQL to deploy Persistent Implant

Fortinet patch actively exploits CVE-2026-35616 in FortiClient EMS

Peter Thiel makes a big bet on solar-powered cow collars

Embattled startup Delve ‘parts ways’ with Y Combinator

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.