New Fortinet FortiClient EMS Flaw Exploited in Attacks as Emergency Patch Is Released

Related

Huawei Zero-Day Attack Behind Luxembourg’s 2025 Nationwide Telecoms Outage

What happened A previously undisclosed zero-day vulnerability in Huawei enterprise...

New GhostLock Tool Abuses Windows API to Block File Access

What happened A security researcher has published a proof-of-concept tool...

Ivanti Warns of New EPMM Flaw Exploited in Zero-Day Attacks

What happened Ivanti has disclosed a high-severity remote code execution...

Mirai-Based xlabs_v1 Botnet Exploits Android Debug Bridge to Hijack IoT Devices

What happened Hunt.io researchers have identified a new Mirai-derived botnet...

Share

What happened

A new Fortinet FortiClient EMS flaw is being exploited in attacks, prompting an emergency weekend patch from Fortinet. The vulnerability, tracked as CVE-2026-35616, is an improper access control issue that allows unauthenticated attackers to execute code or commands through specially crafted requests. Fortinet said the flaw affects FortiClient EMS versions 7.4.5 and 7.4.6 and confirmed that it has been exploited in the wild. The company released hotfixes on Saturday and said the issue will also be addressed in the upcoming FortiClient EMS 7.4.7 release. Defused, which discovered the issue, described it as a pre-authentication API access bypass that allows attackers to bypass authentication and authorization controls entirely. The company also said FortiClient EMS 7.2 is not affected. 

Who is affected

The direct exposure affects organizations running FortiClient EMS versions 7.4.5 and 7.4.6, especially internet-exposed deployments. Shadowserver said it found more than 2,000 exposed FortiClient EMS instances online, with most located in the United States and Germany. 

Why CISOs should care

This matters because the flaw allows unauthenticated code or command execution against an enterprise management platform that may already be exposed to the internet. It also follows another critical FortiClient EMS flaw, CVE-2026-21643, that was reported last week and was also being actively exploited, underscoring continued pressure on this product line. 

3 practical actions

  1. Apply the emergency hotfix immediately: Install the hotfixes for affected FortiClient EMS 7.4.5 and 7.4.6 systems or upgrade to FortiClient EMS 7.4.7 when it becomes available. 
  2. Prioritize exposed management servers: Identify any internet-facing FortiClient EMS deployments and move them to the front of the remediation queue given the confirmed in-the-wild exploitation. 
  3. Treat this as a live compromise risk: Review affected environments for signs of unauthorized access because Fortinet and Defused said exploitation was already observed before disclosure. 

For more news about security flaws under active exploitation, click Vulnerability to read more.

IMG 0514 2
+ posts

John Kevin Hao is a news and feature writer covering cybersecurity, technology, and business targeted for professional audiences.