FortiClient EMS Critical Vulnerability Active Exploitation Hotfix Urged
Summary
The Cyber Security Agency of Singapore issued an urgent alert about CVE-2026-35616, a critical improper access control vulnerability in FortiClient EMS versions 7.4.5 through 7.4.6. The vulnerability is being actively exploited in the wild and allows unauthenticated attackers to execute unauthorized code, potentially compromising the entire server. Fortinet has released a hotfix that users must install immediately.
What changed
Fortinet released security updates addressing CVE-2026-35616, a critical improper access control vulnerability in FortiClient EMS affecting versions 7.4.5 through 7.4.6. The vulnerability enables unauthenticated attackers to execute unauthorized code or commands via crafted requests, potentially achieving full server compromise. The vulnerability is confirmed to be actively exploited in the wild.
Organizations using FortiClient EMS must immediately install the hotfix by following Fortinet's advisory (FG-IR-26-099) and update to the latest version once available. IT and security teams should prioritize patching given the active exploitation status and the severity of potential impact including complete system compromise.
What to do next
- Install the FortiClient EMS hotfix immediately for versions 7.4.5 through 7.4.6
- Update to the latest FortiClient EMS version once available
- Monitor for indicators of compromise and review Fortinet advisory FG-IR-26-099
Source document (simplified)
Alerts
Active Exploitation of Critical Vulnerability in FortiClient EMS
6 April 2026
Fortinet has released security updates to address a critical security vulnerability in FortiClient EMS. Users and administrators of affected versions are advised to install the hotfix immediately and update to the latest version once available.
Background
Fortinet has released security updates to address a critical improper access control vulnerability (CVE-2026-35616) affecting FortiClient EMS.
Impact
Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute unauthorised code or commands via crafted requests, potentially resulting in a full compromise of the FortiClient EMS server.
Known Exploitation
This vulnerability is reportedly being exploited in the wild.
Affected Products
This vulnerability affects FortiClient EMS versions 7.4.5 through 7.4.6.
Mitigation
Users and administrators of affected products are advised to install the hotfix by following the instructions provided in Fortinet’s advisory and update to the latest version once available.
References
https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html
https://fortiguard.fortinet.com/psirt/FG-IR-26-099
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.