CVE-2026-35616

9.8
CVSS
CRITICAL
EPSS6.0%(91th)
CISA KEV
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

FortinetFortiClientEMS7.4.57.4.6
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

🔴Vulnerability Details

2
CVEList
CVE-2026-35616: A improper access control vulnerability in Fortinet FortiClientEMS 72026-04-04
VulnCheck
Fortinet forticlientems Improper Access Control2026

📋Vendor Advisories

1
Fortinet
API authentication and authorization bypass2026-04-04

🕵️Threat Intelligence

3
Bleepingcomputer
CISA orders feds to patch exploited Fortinet EMS flaw by Friday2026-04-06
Hackernews
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS2026-04-05
Bleepingcomputer
New FortiClient EMS flaw exploited in attacks, emergency patch released2026-04-05