Critical (9.8) Actively Exploited

FortiClientEMS unauthenticated RCE (CVE-2026-35616) [PoC]

CVE-2026-35616

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests....

Overview

A critical vulnerability, tracked as CVE-2026-35616, has been identified in Fortinet’s FortiClient Endpoint Management Server (EMS). The flaw is an improper access control issue in versions 7.4.5 through 7.4.6. Due to the lack of proper authentication checks, an unauthenticated remote attacker can send specially crafted requests to the server, potentially leading to the execution of arbitrary code or commands.

Technical Details and Impact

This vulnerability has received the maximum CVSS v3.1 base score of 9.8 (CRITICAL). The high score is due to its network-based attack vector, low attack complexity, and the fact that it requires no privileges or user interaction to exploit. In practical terms, this means an attacker on the same network-or potentially from the internet if the EMS interface is exposed-can target the server without needing any login credentials. Successful exploitation could grant an attacker full control over the FortiClientEMS server, allowing them to install malware, steal sensitive endpoint management data, create backdoors, or pivot to other systems on the network. The FortiClientEMS is a central management console, so a compromise here could impact all managed endpoints.

Affected Products and Remediation

The vulnerability specifically affects FortiClientEMS versions 7.4.5, 7.4.6, and all intermediate builds.

Primary Action: Fortinet has released patches to address this vulnerability. All administrators must immediately upgrade to a fixed version. Consult the official Fortinet security advisory for the specific patched release.

Immediate Mitigation Steps:

  1. Upgrade: Apply the vendor-provided patch as the highest priority.
  2. Network Segmentation: Ensure the FortiClientEMS management interface is not directly exposed to the internet. Restrict access to it using firewall rules, allowing connections only from trusted administrative networks.
  3. Monitor: Review logs from the FortiClientEMS server for any unusual or unauthorized connection attempts, particularly those resulting in process execution or configuration changes.

Until the patch is applied, treating the EMS server as critically exposed is essential. Organizations should assume it is a high-value target for attackers.

Security Insight

This critical flaw in a core network security management product follows a concerning pattern of high-severity vulnerabilities in central administrative platforms. Similar to the CyberStrikeAI tool adopted by hackers for AI-powered attacks, threat actors are increasingly automating the exploitation of such “command center” vulnerabilities to achieve maximum network impact with minimal effort. It underscores the critical need for defense-in-depth, where the security tools themselves must be rigorously hardened and isolated, not just the endpoints they manage.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
z3r0h3ro/CVE-2026-35616-poc ★ 2
BishopFox/CVE-2026-35616-check ★ 1
fevar54/CVE-2026-35616-detector.py

This tool detects if a FortiClient EMS server is vulnerable to **CVE-2026-35616**, a critical improper access control vulnerability affecting versions **7.4.5 through 7.4.6**.

★ 0
keraattin/CVE-2026-35616

CVE-2026-35616 - FortiClient EMS Pre-Authentication API Bypass (CVSS 9.1, CISA KEV). Python & Nmap NSE detection scripts with full technical breakdown. One forged HTTP header bypasses authentication o

★ 0

Showing 4 of 4 known references. Source: nomi-sec/PoC-in-GitHub.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.