<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35616 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35616/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 15:08:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35616/feed.xml" rel="self" type="application/rss+xml"/><item><title>Fortinet FortiClient EMS Unauthenticated Remote Code Execution via CVE-2026-35616</title><link>https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-rce/</link><pubDate>Tue, 07 Apr 2026 15:08:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-rce/</guid><description>A critical vulnerability, CVE-2026-35616, exists in Fortinet FortiClient EMS (Endpoint Management Server) allowing unauthenticated attackers to bypass API authentication and authorization checks to execute arbitrary code or commands, potentially leading to full compromise of the EMS infrastructure.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-35616, has been identified in Fortinet FortiClient EMS versions 7.4.5 through 7.4.6. This vulnerability allows unauthenticated attackers to bypass API authentication and authorization checks, enabling them to execute arbitrary code or commands on the EMS server. FortiClient EMS is a centralized platform used to deploy, configure, and monitor FortiClient agents across an organization, making it a high-value target. The vulnerability is being actively exploited in the wild. Successful exploitation can lead to full compromise of the EMS infrastructure, impacting all managed endpoints and potentially enabling lateral movement across enterprise networks. Defenders should prioritize patching and enhance monitoring capabilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FortiClient EMS instance (versions 7.4.5 through 7.4.6) exposed on the network.</li>
<li>The attacker crafts a malicious HTTP/API request targeting the unauthenticated API interface of the FortiClient EMS.</li>
<li>The crafted request bypasses authentication and authorization checks due to improper access control (CWE-284).</li>
<li>The bypassed access controls allow the attacker to execute unauthorized code or commands on the EMS server.</li>
<li>The attacker obtains control of administrative functionality on the FortiClient EMS server.</li>
<li>The attacker manipulates or exfiltrates sensitive configuration and policy data stored on the EMS.</li>
<li>The attacker deploys malicious payloads to managed endpoints via the compromised EMS server.</li>
<li>The attacker uses the compromised EMS as a foothold for further network intrusion or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35616 can lead to a full compromise of the FortiClient EMS infrastructure. This includes the ability to manipulate or exfiltrate sensitive configuration and policy data, corrupt or disable endpoint protections, disrupt endpoint management services, and deploy malicious payloads to managed endpoints. The vulnerability enables lateral movement across enterprise networks. The CCB has confirmed that this vulnerability has been exploited in the wild.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest Fortinet patch for FortiClient EMS to remediate CVE-2026-35616 immediately.</li>
<li>Upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion as recommended by the CCB.</li>
<li>Deploy the Sigma rule detecting unauthorized API access to the FortiClient EMS webserver to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>fortinet</category><category>forticlient</category><category>ems</category><category>rce</category><category>cve-2026-35616</category></item><item><title>Critical Vulnerability CVE-2026-35616 Exploited in FortiClient EMS</title><link>https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-cve-2026-35616/</link><pubDate>Mon, 06 Apr 2026 20:37:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-cve-2026-35616/</guid><description>CVE-2026-35616, a critical vulnerability in FortiClient EMS, allows unauthenticated remote attackers to execute arbitrary code or commands via crafted API requests due to improper access control, with Fortinet confirming active exploitation.</description><content:encoded><![CDATA[<p>Fortinet has released a hotfix for CVE-2026-35616, a critical vulnerability affecting FortiClient EMS. This flaw enables unauthenticated remote attackers to execute unauthorized code or commands by sending specially crafted requests. The root cause is improper access control within the API authentication process. Fortinet has confirmed that CVE-2026-35616 is being actively exploited in the wild. This vulnerability poses a significant risk to organizations using FortiClient EMS, as successful exploitation could lead to complete system compromise. Defenders need to apply the hotfix immediately and monitor for suspicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable FortiClient EMS server.</li>
<li>The attacker crafts a malicious API request designed to bypass authentication controls.</li>
<li>The crafted request exploits the improper access control vulnerability (CVE-2026-35616) in the API authentication process.</li>
<li>The vulnerable FortiClient EMS server processes the request without proper authentication.</li>
<li>The attacker injects and executes arbitrary code or commands on the FortiClient EMS server.</li>
<li>The attacker gains control of the FortiClient EMS server.</li>
<li>The attacker could leverage the compromised server to manage endpoints, deploy malicious software, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35616 allows unauthenticated remote attackers to execute arbitrary code or commands on a FortiClient EMS server. This could lead to full compromise of the server, potentially impacting hundreds or thousands of managed endpoints. Attackers could leverage this access to deploy ransomware, steal sensitive data, or disrupt business operations. The observed exploitation in the wild indicates a high risk of widespread attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Fortinet hotfix for CVE-2026-35616 to all FortiClient EMS servers immediately.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for unusual API requests targeting FortiClient EMS (see Sigma rules for examples).</li>
<li>Enable logging on FortiClient EMS servers to facilitate investigation of potential incidents.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>fortinet</category><category>forticlient</category><category>ems</category><category>cve-2026-35616</category><category>vulnerability</category></item></channel></rss>