Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/CyberSecurity News/Critical Fortinet FortiClient EMS 0-Day Act Vulnerability Actively
CyberSecurity News

Critical Fortinet FortiClient EMS 0-Day Act Vulnerability Actively

Following disclosure by security researchers, Fortinet has issued an emergency hotfix for a critical zero-day vulnerability in FortiClient EMS that is already under active exploitation by threat...

Jennifer sherman
Jennifer sherman
April 4, 2026 3 Min Read
3 0

Following disclosure by security researchers, Fortinet has issued an emergency hotfix for a critical zero-day vulnerability in FortiClient EMS that is already under active exploitation by threat actors.

Tracked as CVE-2026-35616 and carrying a CVSSv3 score of 9.1 (Critical), the flaw enables unauthenticated attackers to bypass API authentication and authorization controls entirely, allowing them to execute arbitrary code or commands on vulnerable systems.

The vulnerability, classified under CWE-284 (Improper Access Control), resides in the API layer of FortiClient Endpoint Management Server (EMS).

Successful exploitation does not require any prior authentication, user interaction, or elevated privileges, making it particularly dangerous for organizations with internet-exposed EMS deployments.

An unauthenticated remote attacker can send specially crafted API requests to bypass all authentication and authorization checks, effectively gaining full control over endpoint management operations.

The attack vector is network-based, the complexity is low, and the impact spans confidentiality, integrity, and availability conditions that directly account for its near-maximum CVSS rating.

Fortinet’s advisory (FG-IR-26-099) lists the vulnerability’s primary impact as privilege escalation, with active in-the-wild exploitation confirmed by the vendor.

Fortinet FortiClient EMS 0-Day

Only FortiClient EMS versions 7.4.5 and 7.4.6 are affected. FortiClient EMS 7.2. x is not affected and requires no action. The upcoming FortiClient EMS 7.4.7 will include a permanent fix, but Fortinet has made emergency hotfixes available immediately for both affected branches while that release is finalized.

The vulnerability was discovered by Simo Kohonen from threat intelligence firm Defused and independent researcher Nguyen Duc Anh.

Defused observed active in-the-wild exploitation of the flaw earlier this week before reporting it to Fortinet under responsible disclosure protocols. The discovery was made using Defused’s upcoming Radar feature, set to launch next week, which is designed to surface novel exploitation activity in real time.

🚨 New Fortinet vulnerability being exploited as an 0-day

CVE-2026-35616 – FortiClient EMS pre-authentication API access bypass – CVSS 9.1 Critical

After observing in-the-wild exploitation of this vulnerability earlier this week, Defused reported it to Fortinet under… pic.twitter.com/GUk5fCAx91

— Defused (@DefusedCyber) April 4, 2026

Upon receiving the report, Fortinet moved swiftly, publishing its advisory and releasing the emergency hotfix on April 4, 2026, the same day as initial publication.

Fortinet strongly urges all customers running affected versions to apply the emergency hotfix immediately. Detailed installation instructions are available through the official FortiClient EMS release notes for each affected build:

  • FortiClient EMS 7.4.5: Follow hotfix instructions in the 7.4.5 EMS release notes via the Fortinet documentation portal
  • FortiClient EMS 7.4.6: Follow hotfix instructions in the 7.4.6 EMS release notes via the Fortinet documentation portal

Organizations should also monitor their EMS logs for anomalous API activity, particularly unauthenticated requests that may indicate prior exploitation attempts.

Where possible, restricting external access to the EMS management interface at the network perimeter adds a meaningful layer of defense while patching is completed.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerabilityzero-day

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

ShareFile Bugs Allow Server Takeover Without Login

Next Post

Google DeepMind: Hackers Hijack AI Agents via Researchers Warn

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us