Summarize with:

Share
Fortinet has disclosed a critical FortiClient EMS vulnerability that defenders should treat as an immediate priority. According to FG-IR-26-099, CVE-2026-35616 is an improper access control flaw in the product’s API that may allow an unauthenticated attacker to execute unauthorized code or commands through crafted requests. More importantly, Fortinet says it has already observed exploitation in the wild.
That combination matters. When a vulnerability hits an endpoint management platform and the vendor is already warning about active exploitation, the issue stops being a routine patch item. It becomes an initial-access and control-plane risk that can affect the systems meant to help manage and secure endpoints across the estate.
Fortinet rates the issue Critical with a CVSS 3.1 score of 9.1. The advisory, CVRF, and CSAF material all point to the same core problem: an API authentication and authorization bypass in FortiClient EMS. While the advisory summary classifies the weakness as improper access control, Fortinet’s own reference text says the flaw may let an unauthenticated attacker execute unauthorized code or commands.
Affected versions are narrow but important:
In the meantime, Fortinet is directing customers on 7.4.5 and 7.4.6 to install the vendor hotfixes documented in the EMS release notes rather than waiting for 7.4.7.
FortiClient EMS is not just another internal service. It is part of the infrastructure used to manage endpoint security and client deployments. A vulnerability in that layer can create outsized downstream risk because compromise may give an attacker privileged influence over a security-adjacent management plane.
Even without a public exploit chain, the risk profile is already clear:
For defenders, that should trigger the same response pattern used for critical flaws in remote management consoles, VPN gateways, and internet-facing security tooling. If the system is reachable where it should not be, or if exposure assumptions are weak, the blast radius can grow quickly.
CVE-2026-35616 is a strong reminder that management infrastructure can become a high-impact entry point when an unauthenticated flaw appears in the control plane. The headline is not only that FortiClient EMS has a critical bug. The bigger operational point is that Fortinet is already warning about real-world exploitation while affected customers may still be planning normal upgrade timing.
That is the wrong lens. If you run FortiClient EMS 7.4.5 or 7.4.6, the right question is not whether the next maintenance window is close enough. It is whether you can confidently say the hotfix is in place, exposure is constrained, and no one has already abused the API.
It is a critical FortiClient EMS vulnerability tied to an API authentication and authorization bypass that may let an unauthenticated attacker execute unauthorized code or commands.
Fortinet lists FortiClient EMS 7.4.5 through 7.4.6 as affected. FortiClient EMS 7.2 is listed as not affected.
Yes. Fortinet says it has observed exploitation in the wild.
Fortinet is directing customers on affected versions to apply the vendor hotfixes now, while 7.4.7 is expected to include the fix going forward.
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
vulnerabilityCVE-2026-20182 makes Cisco SD-WAN controllers an urgent KEV priority CVE-2026-20182 is not landing as a routine patch bulletin. Cisco says the flaw is already b...
vulnerabilityExim BDAT flaw makes mail servers urgent RCE patch targets CVE-2026-45185 is the kind of bug that forces defenders to remember an old lesson: email infrastructu...
vulnerabilityDirty Frag Linux kernel zero-day gives local users a fast path to root Dirty Frag is the kind of Linux bug defenders worry about because it turns a limited foot...