Back to CVE risk briefs

External risk intelligence

Fortinet FortiClient EMS could allow external attackers to gain full system control

Fortinet FortiClient EMS could allow external attackers to remotely execute code or commands. This flaw is actively being exploited, potentially granting attackers control over your operational systems and network controls, posing a significant risk to the security of your management environment.

NVD published April 4, 2026 (last month)

External risk briefKnown Exploit

CVE-2026-35616

Exposure facts

Severity
CRITICAL
Published by NVD
April 4, 2026 (last month)

H – Horizon Alert

A security vulnerability has been identified in Fortinet FortiClient EMS regarding how the system manages access permissions. This flaw could allow an unauthenticated person to remotely execute unauthorized code or commands on the system. This presents a serious business concern, as it could potentially grant external actors control over the impacted management environment.

A – Asset Exposure

This issue affects Fortinet FortiClient EMS, a centralized platform responsible for managing endpoint security and configuration policies across your environment. Because this system serves as a command center for your devices, unauthorized command execution could allow an attacker to disrupt or compromise your operational systems and network controls. Depending on your specific deployment, this server may be accessible from external networks, which could potentially expose these critical management processes to external attackers.

L – Live Threat

Current monitoring confirms this vulnerability is listed in the CISA Known Exploited Vulnerabilities catalog, which indicates active exploitation is occurring in the wild. Given this documented activity and high threat-modeling scores, there is a significant risk of attempts to leverage this flaw to gain unauthorized system access. Because this vulnerability allows an unauthenticated party to potentially execute unauthorized code, it remains a high-priority concern for our security posture.

O – Operational Fix

To address this security concern, please direct your technical teams to prioritize the application of official vendor mitigations for FortiClient EMS. It is important to review the latest guidance provided by the manufacturer to ensure your environment is properly secured against unauthorized access. Additionally, verify that your current configurations align with the vendor's recommended standards, and discontinue use of the product if required mitigations cannot be implemented.

References