A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
Published: 2026-04-06
CVE-2026-35616 Fortinet FortiClientEMS zero-day exploited in the wild
https://www.theregister.com/2026/04/15/critical_fortinet_sandbox_bugs/
https://www.infosecurity-magazine.com/news/fortinet-emergency-patch-ems-bug/
https://www.theregister.com/2026/04/06/forticlient_ems_bug_exploited/
https://www.securityweek.com/fortinet-rushes-emergency-fixes-for-exploited-zero-day/
https://www.databreachtoday.com/attackers-target-zero-day-flaw-in-fortinet-security-software-a-31344
https://www.darkreading.com/vulnerabilities-threats/fortinet-emergency-patch-forticlient-zero-day
https://therecord.media/singapore-us-warn-of-fortinet-bug-exploited
https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/
https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html
https://www.helpnetsecurity.com/2026/04/04/forticlient-ems-zero-day-cve-2026-35616/
Published: 2026-04-04
Updated: 2026-04-06
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.41371
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest