Changeflow GovPing Data Privacy & Cybersecurity Critical FortiClient EMS Vulnerability Enables ...
Urgent Guidance Added Final

Critical FortiClient EMS Vulnerability Enables Remote Code Execution

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued a critical security advisory regarding a vulnerability in Fortinet FortiClient EMS software. The vulnerability, affecting versions prior to 7.4.7, carries a CVSS Base Score of 9.8 (critical) and enables remote anonymous attackers to execute arbitrary code without authentication. Organizations using FortiClient EMS are advised to apply available mitigations immediately or update to the patched version.

What changed

CERT-Bund published a security advisory regarding CVE-2026-0962, a critical remote code execution vulnerability in Fortinet FortiClient EMS. The vulnerability affects all versions prior to 7.4.7 and has a CVSS Base Score of 9.8, indicating critical severity. An unauthenticated remote attacker can exploit this flaw to execute arbitrary code on affected systems.

Organizations using FortiClient EMS must prioritize immediate remediation by upgrading to version 7.4.7 or later. Where patching cannot be performed promptly, organizations should implement mitigating controls to reduce exposure, such as restricting network access to management interfaces and monitoring for indicators of compromise. This vulnerability poses significant risk to enterprise networks given the software's role in endpoint protection and VPN connectivity.

What to do next

  1. Immediately identify all deployments of FortiClient EMS in the organization
  2. Update FortiClient EMS to version 7.4.7 or later to remediate the vulnerability
  3. If immediate patching is not feasible, implement compensating controls such as restricting network access to EMS servers

Archived snapshot

Apr 7, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-0962] Fortinet FortiClient EMS: Schwachstelle ermöglicht Codeausführung CVSS Base Score 9.8 (kritisch) CVSS Temporal Score 9.4 (kritisch) Remoteangriff ja Datum 06.04.2026 Stand 07.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • Windows

Produktbeschreibung

FortiClient ist ein Endgeräteschutz mit einem integrierten VPN-Client.

Produkte

06.04.2026
- Fortinet FortiClient EMS <7.4.7

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Fortinet FortiClient EMS ausnutzen, um beliebigen Programmcode auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Named provisions

Affected Systems Attack Vector Mitigation

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.

Last updated

Classification

Agency
CERT-Bund
Published
April 6th, 2026
Instrument
Guidance
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0962

Who this affects

Applies to
Government agencies Technology companies Employers
Industry sector
5112 Software & Technology
Activity scope
Endpoint security management VPN client deployment Remote code execution mitigation
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Consumer Finance Healthcare

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Optional. Personalizes your daily digest.

Free. Unsubscribe anytime.