Security Bulletin logo with a close up of a wolf in the background.
Security Bulletin logo with a close up of a wolf in the background.

CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS

On 4 April 2026, Fortinet released a hotfix for a critical vulnerability in FortiClient EMS (CVE-2026-35616) that allows unauthenticated remote threat actors to execute unauthorized code or commands via crafted requests.
Security Bulletin logo with a close up of a wolf in the background.
6 min read

Summary

On 4 April 2026, Fortinet released a hotfix for a critical vulnerability in FortiClient EMS (CVE-2026-35616) that allows unauthenticated remote threat actors to execute unauthorised code or commands via crafted requests. The flaw stems from improper access control in the API authentication.

Fortinet has confirmed observing exploitation of CVE-2026-35616 in the wild. The vulnerability was responsibly disclosed by Defused, which had observed exploitation prior to Fortinet’s official disclosure. Details of the exploitation have not been disclosed publicly.

At the time of writing, Arctic Wolf has not identified a publicly available proof-of-concept exploit for CVE-2026-35616. Threat actors are likely to further target this vulnerability due to its critical impact and ease of remote exploitation.

CVE-2026-21643

Separately, Defused reported observing exploitation of another recently disclosed FortiClient EMS vulnerability (CVE-2026-21643) as early as March 24. This vulnerability was originally disclosed in February without observed exploitation, and Fortinet has since updated their advisory to reflect this activity.

Recommendation

Apply Hotfix

Arctic Wolf strongly recommends that customers apply the hotfix to mitigate CVE-2026-35616.

Product Affected Version Fixed Versions
FortiClient EMS 7.4.5 – 7.4.6 ·       7.4.5 (hotfix)

·       7.4.6 (hotfix)

 

Fortinet has stated that the upcoming FortiClient EMS 7.4.7 release will include a fix for CVE-2026-35616, and in the meantime, the provided hotfixes are sufficient to mitigate the vulnerability.

Please follow your organisation’s patching and testing guidelines to minimise potential operational impact.

References

Share this post: