FortiClientEMS unauthenticated RCE (CVE-2026-35616) [PoC]
CVE-2026-35616
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests....
Overview
A critical vulnerability, tracked as CVE-2026-35616, has been identified in Fortinet’s FortiClient Endpoint Management Server (EMS). The flaw is an improper access control issue in versions 7.4.5 through 7.4.6. Due to the lack of proper authentication checks, an unauthenticated remote attacker can send specially crafted requests to the server, potentially leading to the execution of arbitrary code or commands.
Technical Details and Impact
This vulnerability has received the maximum CVSS v3.1 base score of 9.8 (CRITICAL). The high score is due to its network-based attack vector, low attack complexity, and the fact that it requires no privileges or user interaction to exploit. In practical terms, this means an attacker on the same network-or potentially from the internet if the EMS interface is exposed-can target the server without needing any login credentials. Successful exploitation could grant an attacker full control over the FortiClientEMS server, allowing them to install malware, steal sensitive endpoint management data, create backdoors, or pivot to other systems on the network. The FortiClientEMS is a central management console, so a compromise here could impact all managed endpoints.
Affected Products and Remediation
The vulnerability specifically affects FortiClientEMS versions 7.4.5, 7.4.6, and all intermediate builds.
Primary Action: Fortinet has released patches to address this vulnerability. All administrators must immediately upgrade to a fixed version. Consult the official Fortinet security advisory for the specific patched release.
Immediate Mitigation Steps:
- Upgrade: Apply the vendor-provided patch as the highest priority.
- Network Segmentation: Ensure the FortiClientEMS management interface is not directly exposed to the internet. Restrict access to it using firewall rules, allowing connections only from trusted administrative networks.
- Monitor: Review logs from the FortiClientEMS server for any unusual or unauthorized connection attempts, particularly those resulting in process execution or configuration changes.
Until the patch is applied, treating the EMS server as critically exposed is essential. Organizations should assume it is a high-value target for attackers.
Security Insight
This critical flaw in a core network security management product follows a concerning pattern of high-severity vulnerabilities in central administrative platforms. Similar to the CyberStrikeAI tool adopted by hackers for AI-powered attacks, threat actors are increasingly automating the exploitation of such “command center” vulnerabilities to achieve maximum network impact with minimal effort. It underscores the critical need for defense-in-depth, where the security tools themselves must be rigorously hardened and isolated, not just the endpoints they manage.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| z3r0h3ro/CVE-2026-35616-poc | ★ 2 |
| BishopFox/CVE-2026-35616-check | ★ 1 |
| fevar54/CVE-2026-35616-detector.py This tool detects if a FortiClient EMS server is vulnerable to **CVE-2026-35616**, a critical improper access control vulnerability affecting versions **7.4.5 through 7.4.6**. | ★ 0 |
| keraattin/CVE-2026-35616 CVE-2026-35616 - FortiClient EMS Pre-Authentication API Bypass (CVSS 9.1, CISA KEV). Python & Nmap NSE detection scripts with full technical breakdown. One forged HTTP header bypasses authentication o | ★ 0 |
Showing 4 of 4 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment ...
ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical authentication bypass vulnerability in ChurchCRM's API middleware (ChurchCRM/Slim/Middleware/AuthMiddleware.php) allow...
Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth...
OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.netw...