
[CIVN-2026-0172] Improper Access Control Vulnerability in FortiClient (EMS)
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Improper Access Control Vulnerability in FortiClient (EMS)
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
FortiClient EMS 7.4.0 through to 7.4.6
Overview
A vulnerability has been reported in FortiClient EMS which could allow an unauthenticated attacker to execute arbitrary code with specially crafted requests on the affected system.
Target Audience:
All organizations and individuals using FortiClient EMS deployments.
Risk Assessment:
High risk of Unauthorized command execution, data loss, or full system compromise.
Impact Assessment:
High potential of remote code execution and system compromise.
Description
FortiClient Endpoint Management Server (EMS) is used to centrally manage FortiClient endpoint security deployments within an organization.
The vulnerability exists in FortiClient (EMS) due to an improper access control that allows unauthenticated attacker to bypass authentication and authorization. An attacker could exploit this vulnerability via specially crafted requests.
Successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary code on the affected system.
Note: This vulnerability (CVE-2026-35616) is being exploited in the wild. Users are strongly advised to apply the latest patches immediately.
Solution
Apply appropriate updates as mentioned by the vendor:
https://fortiguard.fortinet.com/psirt/FG-IR-26-099
Vendor Information
Fortinet
https://fortiguard.fortinet.com/psirt/FG-IR-26-099
References
Fortinet
https://fortiguard.fortinet.com/psirt/FG-IR-26-099
Bleeping Computer
https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/
CVE Name
CVE-2026-35616
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnVIPQACgkQ3jCgcSdc
ys+A6Q/+Nzfp8Hqj9OXmpZtCDG3Kw6XzT2D5PiAkERf1HMO/24cC7Dl0hTvW010y
gZP8WF3v3A8VHOwc7TvF42wbr+FCkhFleSIaUysjZW2R3a8OYVXDYeDFaai4auEE
sic/p63xTeWMFPJsOCYCLhkAvbJmAR3Agxqr05vVW+F0J5YY6p2umsJiQby16AOj
ByUjOCWWq+5J0TCvP0gBTOVvkqXqczotMRcD0VuQycbLkn4vxVXe6UwwcEAUPmm6
nsQ9Pp0sC1g74pyQwuT/yzhyw8ZdA6Dy6PVVNTfvaLw3eVy9C5KMLgeqnEtBljMJ
uO7xHB18PLOMtZQDEDMTW66K0RB2GANRFg0es7Bwc13wJJQzVQYlQeKMLoeA2y4B
0NHkQkFJxAbcHWVjcgUaBMz25M49+XCTFv/Jm2rXMg2OAQoiptccjeWPTfzXLpim
j5hnvulqqc6l10V7G3wYUymXV9OGPhUt+C1CWdHFrbXt/1kSGUu4E57k1MdVuJOZ
9d1eW0nytMjtdqo+n4SOuKt1gHoAiBPPgbcRjPyiBagBC9Eyy7bEkiAhDsoPLBu+
9fz86FS5rG1vEqrenU4BtBjKZFb9H4NrVtXA6xiNoDmG9zKFCTBIbVUIsnuzM4KI
TShFQv2iRXplfaVmeDcJoq56jkFEPZ0vsvwcy8A+1k9ICp6Iplw=
=8v4F
—–END PGP SIGNATURE—–


