Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Addresses Critical FortiClient EMS Vulnerability

Fortinet Addresses Critical FortiClient EMS Vulnerability

Posted on April 5, 2026 By CWS

Fortinet has urgently released out-of-band patches to address a critical security flaw in FortiClient EMS, which has been actively exploited. The vulnerability, identified as CVE-2026-35616, carries a CVSS score of 9.1 and involves an API access bypass that leads to privilege escalation.

The company detailed in a recent advisory that this improper access control vulnerability in FortiClient EMS could allow an attacker without authentication to execute unauthorized commands through specially crafted requests. The flaw impacts versions 7.4.5 through 7.4.6, with a complete fix planned for version 7.4.7. A hotfix is currently available to mitigate the issue.

Discovery and Exploitation

The vulnerability was discovered by Simo Kohonen from Defused Cyber and Nguyen Duc Anh. Defused Cyber reported observing zero-day exploitation of CVE-2026-35616. According to watchTowr, exploitation attempts were first detected on its honeypots on March 31, 2026, highlighting the urgency of the patch.

Fortinet confirmed witnessing active exploitation and strongly advises affected users to apply the hotfix immediately. This alert comes shortly after another critical vulnerability, CVE-2026-21643, also faced active attacks, though it remains unclear if the same threat actors are responsible for both incidents.

Impact and Recommendations

Exploiting this flaw allows attackers to bypass API protections, executing malicious commands. Fortinet emphasizes the need for users to update FortiClient EMS to the latest version to prevent unauthorized access.

watchTowr’s CEO, Benjamin Harris, commented on the timing of the exploitation, noting that attackers often exploit vulnerabilities during holiday periods when security teams are less vigilant. This pattern represents a significant risk for organizations using FortiClient EMS.

Conclusion and Future Outlook

The emergence of multiple vulnerabilities in a short period underscores the importance of prompt action. Organizations should consider this a critical emergency response, rather than a routine update task. Immediate application of the hotfix is crucial to secure systems against ongoing threats.

The cybersecurity community continues to watch for further developments, as the exploitation of these vulnerabilities highlights the persistent threat landscape facing enterprise systems.

The Hacker News Tags:API security, CVE-2026-35616, Cybersecurity, FortiClient, Fortinet, privilege escalation, Vulnerability

Post navigation

Previous Post: 36 Malicious npm Packages Exploit Databases for Persistent Access

Related Posts

Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances The Hacker News
Automation Is Redefining Pentest Delivery Automation Is Redefining Pentest Delivery The Hacker News
Meta to End Instagram Encrypted Chats by May 2026 Meta to End Instagram Encrypted Chats by May 2026 The Hacker News
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems The Hacker News
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act The Hacker News
LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet Addresses Critical FortiClient EMS Vulnerability
  • 36 Malicious npm Packages Exploit Databases for Persistent Access
  • Node.js Developers Face Advanced Social Engineering Threat
  • Hackers Exploit Code Leak to Spread Malware via GitHub
  • Fortinet Issues Patch for Critical FortiClient EMS Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark