<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Fortinet — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/fortinet/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/fortinet/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in Fortinet FortiSandbox</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-fortisandbox-vulns/</link><pubDate>Tue, 21 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-fortisandbox-vulns/</guid><description>Multiple vulnerabilities in Fortinet FortiSandbox allow attackers to perform cross-site scripting attacks, disclose information, bypass security measures, and execute arbitrary code, potentially leading to system compromise.</description><content:encoded><![CDATA[<p>Fortinet FortiSandbox is susceptible to multiple vulnerabilities that could allow a malicious actor to compromise the system. While the specific CVEs and affected versions are not detailed in the source, the vulnerabilities enable a range of attacks including Cross-Site Scripting (XSS), information disclosure, security bypass, and ultimately, arbitrary code execution. Successful exploitation could allow attackers to gain unauthorized access, steal sensitive data, or disrupt services. Defenders should promptly investigate and patch their FortiSandbox deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the general nature of the vulnerabilities, a likely attack chain could involve the following steps:</p>
<ol>
<li><strong>Reconnaissance:</strong> Attacker identifies a vulnerable FortiSandbox instance exposed to the network.</li>
<li><strong>XSS Exploitation:</strong> Attacker crafts a malicious request containing XSS payload targeting a FortiSandbox web interface.</li>
<li><strong>Information Disclosure:</strong> Attacker leverages an information disclosure vulnerability to leak sensitive configuration data or credentials.</li>
<li><strong>Security Bypass:</strong> Attacker circumvents security controls or authentication mechanisms due to a flaw in the FortiSandbox.</li>
<li><strong>Code Execution:</strong> Attacker exploits a code execution vulnerability to inject and execute arbitrary commands on the system.</li>
<li><strong>Privilege Escalation:</strong> If necessary, the attacker escalates privileges to gain root or administrator access.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised FortiSandbox as a pivot point to move laterally within the network.</li>
<li><strong>Impact:</strong> Depending on the attacker&rsquo;s objectives, the final impact may include data exfiltration, system disruption, or further compromise of internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to complete compromise of the FortiSandbox appliance, potentially impacting network security monitoring and incident response capabilities. An attacker could gain unauthorized access to sensitive data, disrupt security services, or use the compromised FortiSandbox as a launchpad for further attacks within the network. The impact is significant due to the FortiSandbox&rsquo;s role in analyzing and mitigating threats.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate Fortinet&rsquo;s official security advisories for FortiSandbox to identify specific CVEs and affected versions related to these vulnerabilities.</li>
<li>Apply any available patches or workarounds provided by Fortinet to mitigate the identified vulnerabilities.</li>
<li>Monitor web server logs on the FortiSandbox for suspicious activity, such as unusual HTTP requests or attempts to access sensitive files (reference: webserver log source in Sigma rules).</li>
<li>Implement network segmentation to limit the potential impact of a compromised FortiSandbox instance (reference: network_connection log source).</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fortinet</category><category>fortisandbox</category><category>vulnerability</category><category>xss</category><category>code-execution</category></item><item><title>Fortinet FortiSandbox OS Command Injection Vulnerability (CVE-2026-39808)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-os-command-injection/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-os-command-injection/</guid><description>Fortinet FortiSandbox versions 4.4.0 through 4.4.8 are vulnerable to OS Command Injection (CVE-2026-39808), potentially allowing unauthenticated attackers to execute arbitrary code or commands.</description><content:encoded><![CDATA[<p>Fortinet FortiSandbox versions 4.4.0 through 4.4.8 are susceptible to an OS Command Injection vulnerability identified as CVE-2026-39808. The vulnerability stems from an improper neutralization of special elements used in an OS command, potentially enabling attackers to inject and execute unauthorized code or commands on the affected system. The specifics of the attack vector are not detailed in the initial advisory. Successful exploitation could lead to complete system compromise, data theft, or denial-of-service conditions. Given the severity and potential for remote unauthenticated exploitation, this vulnerability poses a significant risk to organizations utilizing the affected FortiSandbox versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FortiSandbox instance running a version between 4.4.0 and 4.4.8.</li>
<li>The attacker crafts a malicious HTTP request containing OS command injection payloads within a vulnerable parameter (specific vector unknown).</li>
<li>The FortiSandbox system processes the crafted request without proper sanitization or validation.</li>
<li>The injected OS command is executed by the underlying operating system with the privileges of the FortiSandbox application.</li>
<li>The attacker leverages the command execution to install a reverse shell or other remote access tool.</li>
<li>The attacker establishes a persistent connection to the compromised system.</li>
<li>The attacker performs reconnaissance on the internal network.</li>
<li>The attacker moves laterally to other systems, exfiltrates sensitive data, or deploys malicious software.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39808 allows an unauthenticated attacker to execute arbitrary commands on the FortiSandbox appliance. This can lead to full system compromise, potentially enabling data exfiltration, installation of malware, or disruption of services. Given a CVSS score of 9.8, the vulnerability is considered critical. The lack of specific attack vector details in the initial advisory makes mitigation challenging without vendor patches or workarounds.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting FortiSandbox instances (category: <code>webserver</code>, product: <code>linux</code>).</li>
<li>Apply available patches or upgrades from Fortinet to address CVE-2026-39808 as soon as they are released.</li>
<li>Inspect network traffic for unusual outbound connections originating from FortiSandbox appliances (category: <code>network_connection</code>, product: <code>linux</code>).</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts based on common OS command injection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>command-injection</category><category>fortinet</category></item><item><title>Fortinet FortiDDoS-F SQL Injection Vulnerability (CVE-2026-39815)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-sqli/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-sqli/</guid><description>An SQL injection vulnerability (CVE-2026-39815) in Fortinet FortiDDoS-F versions 7.2.1 through 7.2.2 may allow a low-privilege attacker to execute unauthorized code or commands.</description><content:encoded><![CDATA[<p>CVE-2026-39815 is an SQL injection vulnerability affecting Fortinet FortiDDoS-F versions 7.2.1 and 7.2.2. The vulnerability stems from improper neutralization of special elements used in SQL commands. According to Fortinet, an attacker with low privileges could exploit this vulnerability to execute unauthorized code or commands. While the exact attack vector is not detailed in the provided source material, successful exploitation would allow for arbitrary code execution within the context of the FortiDDoS-F appliance. This is a high-severity vulnerability because it could lead to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the FortiDDoS-F appliance with valid low-privilege credentials.</li>
<li>Attacker crafts a malicious SQL query containing special characters designed to exploit the SQL injection vulnerability.</li>
<li>Attacker sends the crafted SQL query to the vulnerable FortiDDoS-F endpoint. (Attack Vector N/A from source)</li>
<li>The FortiDDoS-F appliance processes the malicious SQL query without proper sanitization.</li>
<li>The malicious SQL query is executed against the FortiDDoS-F database.</li>
<li>The attacker injects and executes arbitrary SQL code, potentially gaining access to sensitive data or the ability to modify system configurations.</li>
<li>The attacker leverages the injected SQL code to execute operating system commands on the FortiDDoS-F appliance.</li>
<li>The attacker escalates privileges and compromises the FortiDDoS-F system, potentially gaining complete control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39815 can lead to unauthorized code execution, sensitive data exposure, and complete system compromise of the Fortinet FortiDDoS-F appliance. While the number of potential victims is not specified, all organizations using Fortinet FortiDDoS-F versions 7.2.1 and 7.2.2 are vulnerable. A successful attack could disrupt network operations, compromise sensitive data, and allow attackers to use the FortiDDoS-F appliance as a pivot point for further attacks within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fortinet FortiDDoS-F installations to a patched version that addresses CVE-2026-39815.</li>
<li>Monitor FortiDDoS-F systems for suspicious activity, including unusual SQL queries, leveraging the <code>webserver</code> log source to detect anomalous HTTP requests related to potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious FortiDDoS-F SQL Injection Attempts</code> to your SIEM to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>fortinet</category><category>cve-2026-39815</category></item><item><title>Fortinet FortiSandbox Path Traversal Vulnerability (CVE-2026-39813)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-path-traversal/</link><pubDate>Tue, 14 Apr 2026 16:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-path-traversal/</guid><description>A path traversal vulnerability (CVE-2026-39813) in Fortinet FortiSandbox versions 5.0.0 through 5.0.5 and 4.4.0 through 4.4.8 may allow an unauthenticated attacker to escalate privileges via '../filedir'.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-39813, affects Fortinet FortiSandbox appliances. Specifically, versions 5.0.0 through 5.0.5 and 4.4.0 through 4.4.8 are susceptible. The vulnerability stems from insufficient path validation, potentially allowing an unauthenticated attacker to manipulate file paths and gain elevated privileges on the system. The specific attack vector is not detailed in the source document, but the use of &lsquo;../filedir&rsquo; suggests the possibility of reading or writing arbitrary files. Successful exploitation could lead to complete system compromise, data exfiltration, or denial of service. Defenders should apply available patches or mitigations immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted request to the FortiSandbox appliance.</li>
<li>The request targets a specific endpoint vulnerable to path traversal.</li>
<li>The attacker includes the &ldquo;../filedir&rdquo; sequence within a file path parameter.</li>
<li>The vulnerable application fails to properly sanitize the file path.</li>
<li>The attacker uses path traversal to access sensitive configuration files or system binaries.</li>
<li>By overwriting existing system files, the attacker escalates privileges.</li>
<li>The attacker executes arbitrary commands with elevated privileges.</li>
<li>The attacker gains full control of the FortiSandbox appliance, potentially allowing lateral movement to other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39813 allows an unauthenticated attacker to escalate privileges on the Fortinet FortiSandbox appliance. This could lead to complete system compromise, sensitive data exfiltration, or the deployment of malicious payloads. The lack of specific victim numbers or sectors targeted in the source data prevents further quantitative assessment. However, given the appliance&rsquo;s role in network security, a successful attack could severely impact the security posture of organizations using the vulnerable FortiSandbox versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fortinet FortiSandbox to a patched version outside the vulnerable range (5.0.0-5.0.5 and 4.4.0-4.4.8) to remediate CVE-2026-39813.</li>
<li>Deploy the Sigma rule &ldquo;Detect Fortinet FortiSandbox Path Traversal Attempt&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious requests containing &ldquo;../filedir&rdquo; patterns.</li>
<li>Investigate any alerts generated by the Sigma rules and review system logs for signs of unauthorized access or privilege escalation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>privilege-escalation</category><category>fortinet</category></item><item><title>Fortinet FortiAnalyzer and FortiManager Cloud Heap-Based Buffer Overflow Vulnerability (CVE-2026-22828)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-heap-overflow/</link><pubDate>Tue, 14 Apr 2026 16:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-heap-overflow/</guid><description>CVE-2026-22828 is a heap-based buffer overflow in Fortinet FortiAnalyzer and FortiManager Cloud versions 7.6.2 through 7.6.4, potentially allowing a remote unauthenticated attacker to execute arbitrary code with a significant preparation effort due to ASLR and network segmentation.</description><content:encoded><![CDATA[<p>A heap-based buffer overflow vulnerability, identified as CVE-2026-22828, affects Fortinet FortiAnalyzer Cloud and FortiManager Cloud versions 7.6.2 through 7.6.4. The vulnerability allows a remote, unauthenticated attacker to potentially execute arbitrary code or commands. Exploitation necessitates sending specifically crafted requests to the affected systems. The complexity of a successful exploit is amplified by the presence of Address Space Layout Randomization (ASLR) and network segmentation, which impose significant hurdles for attackers in preparing the environment for code execution. This vulnerability poses a risk to organizations utilizing these Fortinet cloud services, potentially allowing for unauthorized access and control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FortiAnalyzer or FortiManager Cloud instance running versions 7.6.2-7.6.4.</li>
<li>The attacker crafts a malicious HTTP request designed to trigger the heap-based buffer overflow. This involves analyzing the vulnerable application to identify the specific request parameters and data structures that can be manipulated.</li>
<li>The attacker sends the crafted request to the targeted Fortinet Cloud instance.</li>
<li>Due to the buffer overflow, the crafted request overwrites adjacent memory on the heap, potentially corrupting data structures used by the application.</li>
<li>The attacker attempts to leverage the memory corruption to gain control of program execution. Because of ASLR, this step requires careful planning and potentially multiple attempts to bypass address randomization.</li>
<li>Upon successful bypass of ASLR, the attacker overwrites a function pointer or other critical data in memory to redirect program control to attacker-controlled code.</li>
<li>The attacker executes arbitrary code within the context of the FortiAnalyzer or FortiManager Cloud process.</li>
<li>The attacker can now execute commands, potentially gaining unauthorized access to sensitive data, modifying system configurations, or deploying further malicious payloads within the cloud environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-22828 can allow a remote, unauthenticated attacker to execute arbitrary code on vulnerable Fortinet FortiAnalyzer Cloud and FortiManager Cloud instances (versions 7.6.2 through 7.6.4). While the effort required is considerable, a successful attack can lead to a complete compromise of the affected system, potentially resulting in data breaches, service disruption, or the deployment of malicious software. The absence of specific victim counts or sector targeting details in the original advisory emphasizes the importance of proactive mitigation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a fixed version of Fortinet FortiAnalyzer Cloud and FortiManager Cloud to address CVE-2026-22828 (<a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-121)">https://fortiguard.fortinet.com/psirt/FG-IR-26-121)</a>.</li>
<li>Implement network segmentation to limit the potential impact of a successful exploit, as mentioned in the vulnerability description.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious HTTP Requests to Fortinet Cloud Services&rdquo; to identify potential exploitation attempts (see rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-22828</category><category>fortinet</category><category>heap-overflow</category><category>cloud</category></item><item><title>Fortinet FortiClient EMS Unauthenticated Remote Code Execution via CVE-2026-35616</title><link>https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-rce/</link><pubDate>Tue, 07 Apr 2026 15:08:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-rce/</guid><description>A critical vulnerability, CVE-2026-35616, exists in Fortinet FortiClient EMS (Endpoint Management Server) allowing unauthenticated attackers to bypass API authentication and authorization checks to execute arbitrary code or commands, potentially leading to full compromise of the EMS infrastructure.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2026-35616, has been identified in Fortinet FortiClient EMS versions 7.4.5 through 7.4.6. This vulnerability allows unauthenticated attackers to bypass API authentication and authorization checks, enabling them to execute arbitrary code or commands on the EMS server. FortiClient EMS is a centralized platform used to deploy, configure, and monitor FortiClient agents across an organization, making it a high-value target. The vulnerability is being actively exploited in the wild. Successful exploitation can lead to full compromise of the EMS infrastructure, impacting all managed endpoints and potentially enabling lateral movement across enterprise networks. Defenders should prioritize patching and enhance monitoring capabilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable FortiClient EMS instance (versions 7.4.5 through 7.4.6) exposed on the network.</li>
<li>The attacker crafts a malicious HTTP/API request targeting the unauthenticated API interface of the FortiClient EMS.</li>
<li>The crafted request bypasses authentication and authorization checks due to improper access control (CWE-284).</li>
<li>The bypassed access controls allow the attacker to execute unauthorized code or commands on the EMS server.</li>
<li>The attacker obtains control of administrative functionality on the FortiClient EMS server.</li>
<li>The attacker manipulates or exfiltrates sensitive configuration and policy data stored on the EMS.</li>
<li>The attacker deploys malicious payloads to managed endpoints via the compromised EMS server.</li>
<li>The attacker uses the compromised EMS as a foothold for further network intrusion or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35616 can lead to a full compromise of the FortiClient EMS infrastructure. This includes the ability to manipulate or exfiltrate sensitive configuration and policy data, corrupt or disable endpoint protections, disrupt endpoint management services, and deploy malicious payloads to managed endpoints. The vulnerability enables lateral movement across enterprise networks. The CCB has confirmed that this vulnerability has been exploited in the wild.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest Fortinet patch for FortiClient EMS to remediate CVE-2026-35616 immediately.</li>
<li>Upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion as recommended by the CCB.</li>
<li>Deploy the Sigma rule detecting unauthorized API access to the FortiClient EMS webserver to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>fortinet</category><category>forticlient</category><category>ems</category><category>rce</category><category>cve-2026-35616</category></item><item><title>Critical Vulnerability CVE-2026-35616 Exploited in FortiClient EMS</title><link>https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-cve-2026-35616/</link><pubDate>Mon, 06 Apr 2026 20:37:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-forticlient-ems-cve-2026-35616/</guid><description>CVE-2026-35616, a critical vulnerability in FortiClient EMS, allows unauthenticated remote attackers to execute arbitrary code or commands via crafted API requests due to improper access control, with Fortinet confirming active exploitation.</description><content:encoded><![CDATA[<p>Fortinet has released a hotfix for CVE-2026-35616, a critical vulnerability affecting FortiClient EMS. This flaw enables unauthenticated remote attackers to execute unauthorized code or commands by sending specially crafted requests. The root cause is improper access control within the API authentication process. Fortinet has confirmed that CVE-2026-35616 is being actively exploited in the wild. This vulnerability poses a significant risk to organizations using FortiClient EMS, as successful exploitation could lead to complete system compromise. Defenders need to apply the hotfix immediately and monitor for suspicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable FortiClient EMS server.</li>
<li>The attacker crafts a malicious API request designed to bypass authentication controls.</li>
<li>The crafted request exploits the improper access control vulnerability (CVE-2026-35616) in the API authentication process.</li>
<li>The vulnerable FortiClient EMS server processes the request without proper authentication.</li>
<li>The attacker injects and executes arbitrary code or commands on the FortiClient EMS server.</li>
<li>The attacker gains control of the FortiClient EMS server.</li>
<li>The attacker could leverage the compromised server to manage endpoints, deploy malicious software, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35616 allows unauthenticated remote attackers to execute arbitrary code or commands on a FortiClient EMS server. This could lead to full compromise of the server, potentially impacting hundreds or thousands of managed endpoints. Attackers could leverage this access to deploy ransomware, steal sensitive data, or disrupt business operations. The observed exploitation in the wild indicates a high risk of widespread attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Fortinet hotfix for CVE-2026-35616 to all FortiClient EMS servers immediately.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for unusual API requests targeting FortiClient EMS (see Sigma rules for examples).</li>
<li>Enable logging on FortiClient EMS servers to facilitate investigation of potential incidents.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>fortinet</category><category>forticlient</category><category>ems</category><category>cve-2026-35616</category><category>vulnerability</category></item></channel></rss>