Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Issues Urgent Patch for Zero-Day Vulnerability

Fortinet Issues Urgent Patch for Zero-Day Vulnerability

Posted on April 6, 2026 By CWS

Fortinet has swiftly responded to a critical vulnerability discovered in its FortiClient Enterprise Management Server (EMS), releasing urgent fixes over the weekend. The security flaw, identified as CVE-2026-35616, is of critical severity with a CVSS score of 9.1, potentially allowing remote code execution (RCE).

Details of the Vulnerability

The vulnerability arises from improper access control, which remote attackers can exploit by sending specially crafted requests to a vulnerable FortiClient EMS. Notably, the exploit does not require authentication, making it highly dangerous. Fortinet has confirmed the flaw has been exploited in real-world attacks.

To combat this, Fortinet released hotfixes for FortiClient EMS versions 7.4.5 and 7.4.6, while confirming that version 7.2 remains unaffected. Detailed instructions for applying the hotfixes have been made available by the company.

Action Taken by Fortinet

Fortinet has asserted that the forthcoming FortiClient EMS 7.4.7 version will also contain a resolution for this issue. In the interim, the hotfixes are sufficient to mitigate the vulnerability. The cybersecurity firm credited “Defused” for discovering and responsibly reporting the flaw, which allows attackers to bypass API authentication and authorization without credentials.

According to the cybersecurity firm, Defused noticed active exploitation of this vulnerability and promptly informed Fortinet, adhering to responsible disclosure practices.

Exposure and Implications

The Shadowserver Foundation, a non-profit organization dedicated to improving internet security, reported the presence of approximately 2,000 FortiClient EMS instances accessible online, which may be vulnerable to attacks leveraging the new zero-day and another recently patched SQL injection vulnerability, CVE-2026-21643.

The discovery of such vulnerabilities highlights the ongoing threat landscape cyber infrastructures face, emphasizing the need for continuous monitoring and immediate action to safeguard systems against unauthorized access.

Further Reading: Similar vulnerabilities have been exploited in recent attacks, including the TrueConf zero-day used in Asian government breaches and the React2Shell campaign targeting credential data at scale.

Conclusion

Fortinet’s rapid response to this zero-day vulnerability underscores the critical nature of timely security patches in protecting digital environments. Organizations using FortiClient EMS should apply the hotfixes immediately to secure their systems against potential exploits.

Security Week News Tags:cyber attack, Cybersecurity, Defused, FortiClient EMS, Fortinet, Patch, remote code execution, Shadowserver Foundation, Vulnerability, zero-day

Post navigation

Previous Post: Claude Code Vulnerability Risks Developer Security
Next Post: Hackers Exploit Fake Microsoft Teams Domains for Attacks

Related Posts

Researchers Expose WHILL Wheelchair Safety Risks via Remote Hacking Researchers Expose WHILL Wheelchair Safety Risks via Remote Hacking Security Week News
AI in SaaS: Uncovering Hidden Risks and Security Challenges AI in SaaS: Uncovering Hidden Risks and Security Challenges Security Week News
Healthcare Services Group Data Breach Impacts 624,000 Healthcare Services Group Data Breach Impacts 624,000 Security Week News
NIST Publishes Guide for Protecting ICS Against USB-Borne Threats NIST Publishes Guide for Protecting ICS Against USB-Borne Threats Security Week News
Malicious Code on Unity Website Skims Information From Hundreds of Customers Malicious Code on Unity Website Skims Information From Hundreds of Customers Security Week News
XWiki Vulnerability Exploited in Cryptocurrency Mining Operation XWiki Vulnerability Exploited in Cryptocurrency Mining Operation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Authorities Shut Down Criminal VPN in Global Cybercrime Crackdown
  • Google Urges Chrome Update to Block Critical Threats
  • Critical Drupal Security Flaw Threatens Global Websites
  • AI Fuels Surge in Google’s Chrome Vulnerability Discoveries
  • Critical Flaw in Cisco Secure Workload Exposes APIs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Authorities Shut Down Criminal VPN in Global Cybercrime Crackdown
  • Google Urges Chrome Update to Block Critical Threats
  • Critical Drupal Security Flaw Threatens Global Websites
  • AI Fuels Surge in Google’s Chrome Vulnerability Discoveries
  • Critical Flaw in Cisco Secure Workload Exposes APIs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark