Fixing and finding
Jump to remediation plan
CVE ID

CVE-2026-35616

Published 2026-04-04
Updated last month
Vendor/s
Fortinet
Product/s
FortiClient EMS
Version/s
7.4.5
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
9.8
/ 10
Critical
Severity Details
Base score
9.8 Critical
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

Critical CVSS 9.8 vulnerability in Fortinet FortiClient EMS 7.4.5-7.4.6 allows unauthenticated RCE. Active exploitation reported; patch immediately.

CPE

Fortinet logo
Fortinet
Product Version Start Version End (excl.) Status
forticlientems 7.4.5 7.4.5 vulnerable
forticlientems 7.4.6 7.4.6 vulnerable

Related weakness (CWE)

CWE-284

Remediation plan

1

Apply official patches

Immediately consult Fortinet PSIRT advisory FG-IR-26-099 and apply the latest security patches provided by the vendor to resolve the improper access control flaw.

2

Update affected systems

Upgrade all FortiClient EMS instances running versions 7.4.5 and 7.4.6 to the recommended secure version (7.4.7 or later) as specified in the vendor documentation.

3

Restrict access

Isolate the FortiClient EMS management interface from the public internet using a firewall or VPN, and implement strict IP-based access control lists (ACLs) to allow only trusted administrative traffic.

4

Monitor for exploitation

Audit EMS logs for unauthorized administrative actions, unusual command execution patterns, or suspicious network requests that deviate from established baselines.

Detection Guidance

Monitor network traffic for malformed or suspicious requests targeting FortiClient EMS management ports. Specifically, look for unexpected POST requests or indicators of command injection in application logs. Security teams should also inspect system logs for unauthorized child processes spawned by the EMS service and review endpoint activity for any unexpected policy changes or software deployments that may indicate the management server has been compromised.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management