April 7 Advisory: Improper Access Control Vulnerability in Fortinet FortiClient EMS [CVE-2026-35616]

Rapid Response

Vulnerability Description

FortiClient EMS 7.4.5 through 7.4.6 is affected by an improper access control vulnerability, and Fortinet has assigned a CVSS v3.1 score of 9.1. NVD has added this to their database as well, but with a higher score of 9.8. According to Fortinet PSIRT FG-IR-26-099, an unauthenticated remote attacker may send crafted requests that bypass API authentication and authorization, resulting in unauthorized code or command execution. Fortinet states the issue has been exploited in the wild, and CISA added this to their Known Exploited Vulnerabilities Catalog (KEV). If you are running these devices, treat your Internet-exposed EMS management surfaces as high risk until patched and consider restricting access to trusted networks where possible.

Global heat map of hosts exposed to CVE-2026-35616
Map of exposed hosts. See the full breakdown by country → 
FieldDescription
CVE-IDCVE-2026-35616 — CVSS v3 9.1— assigned by Fortinet
Vulnerability DescriptionFortiClient EMS 7.4.5 through 7.4.6 is affected by an improper access control vulnerability that allows an unauthenticated remote attacker to send crafted requests that bypass API authentication and authorization, resulting in unauthorized code or command execution.
Date of DisclosureApril 3, 2026
Affected AssetsFortinet FortiClient EMS 
Vulnerable Software Versions7.4.5 through 7.4.6
PoC AvailableNo public PoCs have been observed at this time.
Exploitation StatusFortinet has observed exploitation in the wild, and this was added to CISA KEV on April 6th, 2026.
Patch StatusFortinet has published version-specific hotfix instructions for 7.4.5 and 7.4.6, which are linked in their advisory. FortiClientEMS 7.4.7 will also include a fix. The 7.2 EMS branch is listed as not affected.

Censys ARC Perspective

Censys observes around 10K exposed hosts serving FortiClient EMS. Of these, 3,835 hosts are potentially vulnerable given that they serve banners that match affected versions.

Platform

(host.services.endpoints.http.html_title: "FortiClient Endpoint Management Server" or host.services.cert.parsed.subject_dn: "CN=FortiClient Enterprise Management Server" or host.services.endpoints.http.favicons.hash_md5: "fb9c168a99561a9672f6dce2144ad7e7" or host.services.protocol: "FORTINET_FCM" or web.endpoints.http.html_title: "FortiClient Endpoint Management Server" or web.cert.parsed.subject_dn: "CN=FortiClient Enterprise Management Server" or web.endpoints.http.favicons.hash_md5: "fb9c168a99561a9672f6dce2144ad7e7") and not labels: "HONEYPOT"


Attack Surface Management

host.services.http.response.html_title: "FortiClient Endpoint Management Server" or host.services.tls.certificates.leaf_data.subject_dn: "CN=FortiClient Enterprise Management Server" or host.services.http.response.favicons.md5_hash: "fb9c168a99561a9672f6dce2144ad7e7" or host.services.service_name: "FORTINET_FCM" or web_entity.instances.http.response.html_title: "FortiClient Endpoint Management Server" or web_entity.instances.tls.certificates.leaf_data.subject_dn: "CN=FortiClient Enterprise Management Server" or web_entity.instances.http.response.favicons.md5_hash: "fb9c168a99561a9672f6dce2144ad7e7"


Legacy Search

(services.http.response.html_title: "FortiClient Endpoint Management Server" or services.tls.certificates.leaf_data.subject_dn: "CN=FortiClient Enterprise Management Server" or services.http.response.favicons.md5_hash = "fb9c168a99561a9672f6dce2144ad7e7" or services.service_name: "FORTINET_FCM") and not labels: {honeypot, tarpit}


References