Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers

April 8, 2026

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

April 8, 2026

Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploit

April 8, 2026
Facebook X (Twitter) Instagram
Wednesday, April 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploit
News

Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploit

Team-CWDBy Team-CWDApril 8, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Fortinet customers have been urged to update their FortiClient Enterprise Management Server (EMS) products after the vendor was forced to issue an emergency patch over the weekend.

CVE-2026-35616 is a critical (CVSS 9.1) improper access control vulnerability which could allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

“Fortinet has observed this to be exploited in the wild and urges vulnerable customers to install the hotfix for FortiClient EMS 7.4.5 and 7.4.6,” the vendor said. “Upcoming FortiClientEMS 7.4.7 will also include a fix for this issue. In the meantime, the hotfix above is sufficient to prevent it entirely.”

Read more on Fortinet vulnerabilities: Fortinet Warns Exploit Code Available for Critical Vulnerability

Cybersecurity vendor Defused explained that it had seen the vulnerability being exploited in zero-day attacks earlier last week and notified Fortinet accordingly.

“The vulnerability allows an unauthenticated attacker to bypass API authentication and authorization entirely, unauthorized code or commands via crafted requests,” Defused said in a social media post.

Second Critical Flaw in a Week

Defused also discovered another critical vulnerability in the FortiClient EMS platform last week, also being exploited in the wild.

CVE-2026-21643 is an SQL injection flaw with a CVSS score of 9.8 which could allow unauthenticated attackers to execute unauthorized code via specifically crafted HTTP requests.

By hijacking organizations’ endpoint management infrastructure, threat actors could push malicious updates to endpoints and launch deeper attacks into cloud systems, for possible espionage and ransomware.

For that specific vulnerability, customers were urged to upgrade to version 7.4.5 or later, or at least disconnect the administrative web interface from the internet. Indicators of compromise (IoCs) included HTTP 500 errors on the /api/v1/init_consts endpoint; unusual database error messages in PostgreSQL logs; and unauthorized remote monitoring and management tools.

Endpoint management solutions are a popular target for threat actors given the access they provide to company device fleets. This can be weaponized in ransomware, cyber espionage or  destructive attacks.

In 2024, Fortinet was forced to patch a critical SQL injection vulnerability in FortiClientEMS which could have enabled remote code execution (RCE) on targeted servers.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability
Next Article Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
Team-CWD
  • Website

Related Posts

News

US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers

April 8, 2026
News

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

April 8, 2026
News

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

April 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

In memoriam: David Harley

November 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.