Protection

Critical Security Alert: FortiClient EMS:Remote Code Execution Vulnerability

27.03.2026
İbrahim Fırat Co-founder
İbrahim Fırat

Summary Information

CVE Numbers CVE-2026-35616, CVE-2026-21643
Affected Product FortiClient EMS
Affected Versions 7.4.5, 7.4.6
Vulnerability Type Pre-Authentication Remote Code Execution (Pre-Auth RCE)
Exploitation Status Actively exploited
Vendor Fortinet


Vulnerability Details

According to the latest information published by Fortinet, a critical security vulnerability affecting the FortiClient EMS product has been identified as being actively exploited. This indicates that the relevant systems can be directly targeted.

The vulnerability allows attackers to execute unauthorized commands or code on the system through specially crafted requests without requiring authentication. This creates a risk of unauthorized access and potential takeover of system control.

Affected Versions


Additional Assessment

Considering that the CVE-2026-21643 vulnerability affecting the same product was also recently identified as being actively exploited, it is understood that the FortiClient EMS product is being heavily targeted by threat actors. This indicates that systems are continuously being scanned and vulnerabilities can be rapidly exploited.

Recommended Actions

  1. Immediately apply the hotfixes released by Fortinet and increase the protection level of the systems
  2. Upgrade systems to up-to-date and secure versions as soon as possible
  3. Regularly review FortiClient EMS access logs and identify suspicious activities
  4. Restrict direct external network access to the EMS server and prefer secure access methods such as VPN when necessary

References

Get a Demo