CVE-2026-35616
Fortinet FortiClient EMS Improper Access Control Vulnerability - [Actively Exploited]
Description
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
INFO
Published Date :
April 4, 2026, 1:16 a.m.
Last Modified :
April 6, 2026, 6:12 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Unknown
Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://fortiguard.fortinet.com/psirt/FG-IR-26-099 ; https://nvd.nist.gov/vuln/detail/CVE-2026-35616
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | 6abe59d8-c742-4dff-8ce8-9b0ca1073da8 | ||||
| CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Update FortiClientEMS to the latest available version.
- Apply vendor patches or security advisories.
- Restrict access to the affected service.
- Monitor for unauthorized activity.
Public PoC/Exploit Available at Github
CVE-2026-35616 has a 16 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-35616.
| URL | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-26-099 | Vendor Advisory Patch |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-35616 | US Government Resource |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-35616 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-35616
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Security advisories published by Caladan Security Studio
None
Python
None
Python
macOS vulnerability check script - detects 23 recent supply chain attacks and CVEs (Jan-Apr 2026)
Shell
Standalone offline browser for the CISA Known Exploited Vulnerabilities (KEV) catalog. No server, no install — open in any browser.
Python HTML
Fortinet FortiClientEMS improper access control
Python
CVE-2026-35616 - FortiClient EMS Pre-Authentication API Bypass (CVSS 9.1, CISA KEV). Python & Nmap NSE detection scripts with full technical breakdown. One forged HTTP header bypasses authentication on FortiClient EMS 7.4.5–7.4.6, granting full admin API access to all managed endpoints.
authentication-bypass cybersecurity forticlient fortinet nmap-scripts nse-scripts vulnerability-detection vulnerability-research cve-2026-35616 forticlient-ems
Python Lua
None
JavaScript HTML CSS
Retrieves CVEs added in the last N days from CISA's Known Exploited Vulnerability (KEV) database.
Python
None
Python
None
Python
This tool detects if a FortiClient EMS server is vulnerable to **CVE-2026-35616**, a critical improper access control vulnerability affecting versions **7.4.5 through 7.4.6**.
Python
None
CVE-2026-35616
Python
Security Tracker
Python
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-35616 vulnerability anywhere in the article.
-
The Hacker News
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet
Threat actors are exploiting security flaws in TBK DVR and end‑of‑life (EoL) TP-Link Wi-Fi routers to deploy Mirai-botnet variants on compromised devices, according to findings from Fortinet FortiGuar ... Read more
-
The Hacker News
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploi ... Read more
-
The Hacker News
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
A recently disclosed high-severity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency (CISA). To tha ... Read more
-
The Hacker News
ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you igno ... Read more
-
The Hacker News
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate an ... Read more
-
The Register
Patch these critical Fortinet sandbox bugs that let attackers bypass login, run commands over HTTP
Watch out for more Fortinet vulns! Two critical bugs in Fortinet's sandbox could allow unauthenticated attackers to bypass authentication or execute unauthorized code on vulnerable systems. Luckily, t ... Read more
-
The Hacker News
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
A recently disclosed critical security flaw impacting nginx-ui, an open-source, web-based Nginx management tool, has come under active exploitation in the wild. The vulnerability in question is CVE-20 ... Read more
-
The Hacker News
April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
A number of critical vulnerabilities impacting products from Adobe, Fortinet, Microsoft, and SAP have taken center stage in April's Patch Tuesday releases. Topping the list is an SQL injection vulnera ... Read more
-
Daily CyberSecurity
Adobe Rushes Patches for Critical ColdFusion RCE and Security Bypasses
Adobe has released an urgent set of security updates to address multiple vulnerabilities within its ColdFusion 2025 and 2023 versions. The patches resolve a range of critical and moderate security gap ... Read more
-
Daily CyberSecurity
Critical 9.1 Flaws Hit Fortinet FortiSandbox
Fortinet has issued an urgent advisory regarding two critical vulnerabilities in its FortiSandbox platform—vulnerabilities that could allow unauthenticated attackers to bypass security entirely and se ... Read more
-
Daily CyberSecurity
Active SharePoint Spoofing and Legacy Office RCE: CISA Alerts on New KEV Exploits
The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog, sounding a fresh warning about two high-risk security flaws currently being ... Read more
-
Daily CyberSecurity
25 Million Users at Risk: Fastify Publicly Discloses PoC Exploit for Single-Space Security Bypass
In the world of web performance, Fastify is a heavyweight, boasting over 25 million monthly downloads and a reputation for being one of the fastest frameworks available. However, a newly disclosed vul ... Read more
-
Daily CyberSecurity
OpenStack Keystone Flaw Grants Access to Disabled LDAP Users
In the complex machinery of cloud identity management, a single misinterpretation of data can lead to a significant security breach. A recently disclosed vulnerability in OpenStack Keystone, the prima ... Read more
-
Daily CyberSecurity
Urgent Patch Alert: SharePoint Spoofing Under Active Attack as Microsoft Releases April 2026 Updates
Microsoft’s April 2026 Patch Tuesday has arrived with a massive security payload, addressing a staggering 163 vulnerabilities, including eight rated as critical. While the volume alone is significant, ... Read more
-
Daily CyberSecurity
Critical—9 Vulnerabilities in Orthanc DICOM Servers Threaten Medical Data Integrity
A series of critical security flaws has been uncovered in Orthanc, the popular open-source “lightweight Digital Imaging and Communications in Medicine (DICOM) server used to store, process, and retrie ... Read more
-
The Hacker News
Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security
Google has announced the integration of a Rust-based Domain Name System (DNS) parser into the modem firmware as part of its ongoing efforts to beef up the security of Pixel devices and push memory-saf ... Read more
-
Daily CyberSecurity
Juju’s CVSS 10 Flaw Hands Over Master Cloud Credentials
Juju, the popular open-source application orchestration engine, is facing a critical security emergency. A newly discovered vulnerability, carrying the maximum possible severity rating of CVSS 10, all ... Read more
-
Daily CyberSecurity
CVE-2026-4810: Critical 9.3 RCE Flaw Hits Google’s AI Agent Development Kit
A recently disclosed vulnerability in Google’s Agent Development Kit (ADK) serves as a stark reminder that even the most modular frameworks are not immune to classic security pitfalls. Security resear ... Read more
-
Daily CyberSecurity
CVE-2026-4631: Critical 9.8 RCE Flaw in Cockpit Allows Unauthenticated Server Takeover
In the world of Linux server management, ease of use and security are intended to go hand-in-hand. However, a critical vulnerability discovered in Cockpit, the lightweight and popular interactive serv ... Read more
-
Daily CyberSecurity
Critical wolfSSL Flaw Could Allow Attackers to Spoof Trusted Hosts
In the world of embedded systems and resource-constrained environments, wolfSSL (formerly CyaSSL) is the lightweight champion of security. Known for its small footprint—up to 20 times smaller than Ope ... Read more
The following table lists the changes that have been made to the
CVE-2026-35616 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Apr. 06, 2026
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:a:fortinet:forticlientems:7.4.5:*:*:*:*:*:*:* *cpe:2.3:a:fortinet:forticlientems:7.4.6:*:*:*:*:*:*:* Added Reference Type Fortinet, Inc.: https://fortiguard.fortinet.com/psirt/FG-IR-26-099 Types: Patch, Vendor Advisory Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-35616 Types: US Government Resource -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Apr. 06, 2026
Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-35616 -
New CVE Received by [email protected]
Apr. 04, 2026
Action Type Old Value New Value Added Description A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-284 Added Reference https://fortiguard.fortinet.com/psirt/FG-IR-26-099