Fortinet FortiClientEMS Improper Access Control Vulnerability
Summary
CISA published a critical cybersecurity advisory for CVE-2026-35616, an improper access control vulnerability in Fortinet FortiClientEMS versions 7.4.5 through 7.4.6. The vulnerability carries a CVSS score of 9.1 and is being actively exploited, allowing unauthenticated attackers to execute unauthorized code or commands via crafted requests. CISA has marked this vulnerability in its SSVC and KEV catalogs with active exploitation and total technical impact.
What changed
CISA and Fortinet disclosed CVE-2026-35616, a critical improper access control vulnerability (CWE-284: Escalation of Privilege) affecting FortiClientEMS versions 7.4.5 through 7.4.6. The vulnerability allows unauthenticated remote attackers to execute arbitrary code or commands via crafted requests. With a CVSS 3.1 score of 9.1 (CRITICAL) and confirmed active exploitation, this vulnerability poses severe risk of complete system compromise, data exfiltration, and network pivoting.
Organizations running affected FortiClientEMS versions must immediately apply patches or upgrade to a non-vulnerable version. CISA recommends reviewing Fortinet advisory FG-IR-26-099 for remediation details, auditing systems for indicators of compromise, and implementing network-based detection for exploitation attempts. Federal agencies are required to remediate vulnerabilities cataloged in KEV per BOD 22-01 deadlines.
What to do next
- Immediately patch FortiClientEMS to a version beyond 7.4.6 or apply available updates per Fortinet advisory FG-IR-26-099
- Audit systems for indicators of compromise and unauthorized access using CISA's KEV catalog entries
- Implement network-based detection and monitoring for exploitation attempts targeting FortiClientEMS
Source document (simplified)
Required CVE Record Information
CNA: Fortinet, Inc.
Description
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.
CWE 1 Total
Learn more
- CWE-284: Escalation of privilege
CVSS 1 Total
Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 9.1 | CRITICAL | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
Product Status
Learn more Versions 1 Total
Default Status: unaffected
affected
- affected from 7.4.5 through 7.4.6
References 1 Total
Authorized Data Publishers
CISA-ADP
Updated:
2026-04-06
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.
SSVC 1 Total
Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | yes | total | 2.0.3 | 2026-04-06 |
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CISA Cybersecurity Advisories publishes new changes.