Forum Discussion
CVE-2026-35616: Fortinet FortiClientEMS zero-day vulnerability exploited in the wild
On April 4, Fortinet published a security advisory (FG-IR-26-099) for CVE-2026-35616, a critical improper access control vulnerability affecting Fortinet FortiClientEMS.
|
CVE |
Description |
CVSSv3 |
|
CVE-2026-35616 |
Fortinet FortiClientEMS Improper Access Control Vulnerability |
9.1 |
CVE-2026-35616 is a critical improper access control vulnerability affecting Fortinet FortiClientEMS. A remote, unauthenticated attacker can exploit this flaw to execute arbitrary code using specially crafted requests which bypass API authentication.
While no attribution has been provided as of the time this blog was published, the advisory from Fortinet confirms that exploitation has been observed. The advisory credits Simo Kohonen from Defused and Nguyen Duc Anh, who reported the vulnerability to Fortinet. On April 4, Defused released a Linkedin post confirming their observations of zero-day exploitation of this flaw.
For more information about the vulnerability, including the availability of patches and Tenable product coverage, please visit our blog.