Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Addresses Critical FortiClient EMS Vulnerability

Fortinet Addresses Critical FortiClient EMS Vulnerability

Posted on April 5, 2026 By CWS

Fortinet has urgently released out-of-band patches to address a critical security flaw in FortiClient EMS, which has been actively exploited. The vulnerability, identified as CVE-2026-35616, carries a CVSS score of 9.1 and involves an API access bypass that leads to privilege escalation.

The company detailed in a recent advisory that this improper access control vulnerability in FortiClient EMS could allow an attacker without authentication to execute unauthorized commands through specially crafted requests. The flaw impacts versions 7.4.5 through 7.4.6, with a complete fix planned for version 7.4.7. A hotfix is currently available to mitigate the issue.

Discovery and Exploitation

The vulnerability was discovered by Simo Kohonen from Defused Cyber and Nguyen Duc Anh. Defused Cyber reported observing zero-day exploitation of CVE-2026-35616. According to watchTowr, exploitation attempts were first detected on its honeypots on March 31, 2026, highlighting the urgency of the patch.

Fortinet confirmed witnessing active exploitation and strongly advises affected users to apply the hotfix immediately. This alert comes shortly after another critical vulnerability, CVE-2026-21643, also faced active attacks, though it remains unclear if the same threat actors are responsible for both incidents.

Impact and Recommendations

Exploiting this flaw allows attackers to bypass API protections, executing malicious commands. Fortinet emphasizes the need for users to update FortiClient EMS to the latest version to prevent unauthorized access.

watchTowr’s CEO, Benjamin Harris, commented on the timing of the exploitation, noting that attackers often exploit vulnerabilities during holiday periods when security teams are less vigilant. This pattern represents a significant risk for organizations using FortiClient EMS.

Conclusion and Future Outlook

The emergence of multiple vulnerabilities in a short period underscores the importance of prompt action. Organizations should consider this a critical emergency response, rather than a routine update task. Immediate application of the hotfix is crucial to secure systems against ongoing threats.

The cybersecurity community continues to watch for further developments, as the exploitation of these vulnerabilities highlights the persistent threat landscape facing enterprise systems.

The Hacker News Tags:API security, CVE-2026-35616, Cybersecurity, FortiClient, Fortinet, privilege escalation, Vulnerability

Post navigation

Previous Post: 36 Malicious npm Packages Exploit Databases for Persistent Access
Next Post: North Korean Hackers Exploit Drift in $285 Million Crypto Heist

Related Posts

How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents The Hacker News
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks The Hacker News
Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict The Hacker News
Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities The Hacker News
Iranian Hacker Pleads Guilty in  Million Robbinhood Ransomware Attack on Baltimore Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore The Hacker News
Silver Fox Intensifies Asia Cyber Campaign with New Trojan Silver Fox Intensifies Asia Cyber Campaign with New Trojan The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China’s Storm-1175 Launches Rapid Medusa Ransomware Attacks
  • Storm-1175 Exploits Internet Vulnerabilities in Medusa Attacks
  • Wynn Resorts Data Breach Affects Over 21,000 Employees
  • Severe Vulnerability Exploited in Flowise AI Platform
  • Windows Defender Zero-Day Exploit Unveiled by Researcher

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China’s Storm-1175 Launches Rapid Medusa Ransomware Attacks
  • Storm-1175 Exploits Internet Vulnerabilities in Medusa Attacks
  • Wynn Resorts Data Breach Affects Over 21,000 Employees
  • Severe Vulnerability Exploited in Flowise AI Platform
  • Windows Defender Zero-Day Exploit Unveiled by Researcher

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark