Fortinet has issued an urgent security advisory for a critical, actively exploited zero-day vulnerability in its FortiClient Endpoint Management Server (EMS). The vulnerability, tracked as CVE-2026-35616, has a CVSS score of 9.1 (Critical) and allows an unauthenticated, remote attacker to bypass API authentication and execute arbitrary code. Due to confirmed in-the-wild exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-35616 to its Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching by federal agencies. All organizations using the affected FortiClient EMS versions are urged to apply the provided hotfixes without delay to prevent system compromise.
The vulnerability impacts the following versions of FortiClient EMS:
Note: The 7.2 branch of FortiClient EMS is reportedly not affected by this vulnerability.
Fortinet has confirmed that it has observed active exploitation of CVE-2026-35616 in the wild. Following this confirmation, CISA added the vulnerability to its KEV catalog on April 6, 2026, with a remediation deadline of April 9, 2026, for Federal Civilian Executive Branch (FCEB) agencies. The Cyber Security Agency of Singapore (CSA) has also issued a corresponding alert, indicating a global threat.
A successful exploit of CVE-2026-35616 has severe consequences. The FortiClient EMS is a central management server for an organization's endpoints. Compromising the EMS server could allow an attacker to:
This represents a catastrophic failure of the endpoint security management infrastructure.
Security teams should hunt for signs of exploitation attempts in their logs:
powershell.exe, cmd.exe, or wscript.exe.D3-NTA): Analyze traffic to the EMS server to identify anomalous request patterns or connections from known malicious IPs.D3-PA): Monitor the EMS server for suspicious child processes or command-line executions indicative of post-exploitation activity.Immediate patching is the only effective remediation.
D3-SU): This is the primary and most critical countermeasure. Applying the security update from Fortinet directly remediates the vulnerability.CVSS score updated to 9.8, nearly 2,000 FortiClient EMS instances exposed online, and new IOCs released as exploitation attempts increase.
The CVSS score for CVE-2026-35616 has been updated from 9.1 to 9.8, reflecting a higher critical impact. Analysis reveals nearly 2,000 FortiClient EMS instances are exposed online, with initial exploitation detected around March 31, 2026. Security researchers report a significant increase in scanning and exploitation attempts. New indicators of compromise (IOCs) include specific URL patterns (/api/v1/vulnerabilities), monitoring FCTDas.exe for suspicious child processes, and scrutinizing inbound connections to EMS port 8013. Organizations are urged to apply hotfixes immediately and consider network isolation for management interfaces.
CISA sets strict April 9 deadline for Fortinet EMS patch; vulnerability discovered by Defused.
The U.S. CISA officially added CVE-2026-35616 to its Known Exploited Vulnerabilities catalog on April 6, 2026, mandating federal agencies to apply the Fortinet hotfix by April 9, 2026. The vulnerability, which allows remote code execution in FortiClient EMS versions 7.4.5 and 7.4.6, was reportedly discovered and reported by the security firm Defused. This update reinforces the critical urgency for all organizations to patch immediately due to active exploitation.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats