BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Fortinet Patches Critical FortiClient EMS Auth Bypass Under Active Exploitation

Fortinet Patches Critical FortiClient EMS Auth Bypass Under Active Exploitation

criticalVulnerabilities & Exploits|April 6, 20262 min read

Originally reported by Security Affairs

#fortinet#authentication-bypass#zero-day#enterprise-security#active-exploitation
Share

TL;DR

Fortinet issued out-of-band patches for CVE-2026-35616, a CVSS 9.1 authentication bypass vulnerability in FortiClient EMS that attackers are actively exploiting. The improper access control flaw allows threat actors to bypass authentication mechanisms in the endpoint management system.

Why critical?

CVSS 9.1 vulnerability in enterprise security infrastructure with confirmed active exploitation warrants immediate attention. Authentication bypass flaws in endpoint management systems pose severe risk to organizational security posture.

Critical Authentication Bypass Under Active Attack

Fortinet has released emergency patches for CVE-2026-35616, a critical authentication bypass vulnerability in FortiClient Endpoint Management Server (EMS) that threat actors are actively exploiting in the wild. The vulnerability carries a CVSS score of 9.1, reflecting its severe impact on enterprise security infrastructure.

Technical Details

The flaw stems from an improper access control implementation that allows attackers to bypass authentication mechanisms within FortiClient EMS. This endpoint management platform serves as a centralized control point for managing FortiClient installations across enterprise networks, making it a high-value target for threat actors seeking to establish persistence or lateral movement capabilities.

Authentication bypass vulnerabilities in endpoint management systems present particularly severe risks, as successful exploitation can provide attackers with administrative access to endpoint security controls across an organization's infrastructure.

Immediate Response Required

The combination of active exploitation and the critical nature of the affected system demands immediate patching. Organizations running FortiClient EMS should prioritize applying the emergency patches released by Fortinet.

Given the active exploitation status, security teams should also conduct thorough reviews of FortiClient EMS logs for indicators of compromise and unauthorized access attempts that may have occurred before patch deployment.

Threat Landscape Context

This incident follows a pattern of threat actors increasingly targeting enterprise security infrastructure components. Endpoint management systems represent attractive targets due to their privileged access across corporate networks and their potential to facilitate large-scale compromises.

The rapid release of out-of-band patches suggests Fortinet became aware of active exploitation through threat intelligence or customer reports, highlighting the ongoing threat to unpatched systems.

Sources

  • https://securityaffairs.com/190392/hacking/cve-2026-35616-fortinet-fixes-actively-exploited-high-severity-flaw.html

Originally reported by Security Affairs

Tags

#fortinet#authentication-bypass#zero-day#enterprise-security#active-exploitation

Related Intelligence

  • Critical Fortinet Zero-Day Exploited in Wild, Malicious npm Campaign Targets Databases

    criticalApr 5, 2026
  • Critical Infrastructure Under Fire: Cisco Zero-Day Exploited Since 2023, Google Disrupts China APT

    criticalFeb 26, 2026
  • CISA Adds FileZen to KEV as Multiple Critical Vulnerabilities Surface

    criticalFeb 25, 2026

Related Knowledge

  • NERF Training: Vulnerability Research Deep Dive

    offensive
  • NERF Web Security Deep Dive — Training Knowledge Base

    offensive
  • NERF Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← German Authorities Identify REvil and GandCrab Ransomware Leader as Russian National

Next Article

Class Action Lawsuit Alleges Perplexity AI Transmitted Private Conversations Despite Incognito Mode→