Threat Type: Actively Exploited ZeroDay
Affected Product: Fortinet FortiClient Enterprise Management Server (EMS)
Background:
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent directive requiring federal agencies to patch CVE‑2026‑35616, an actively exploited zero‑day vulnerability in Fortinet FortiClient Enterprise Management Server (EMS), by April 9.
The flaw is a pre‑authentication API access bypass that allows an unauthenticated attacker to execute arbitrary code or commands on vulnerable EMS servers. Exploitation activity was observed as early as 31 March 2026, and Fortinet urges immediate application of hotfixes for affected versions
Fortinet has confirmed that the vulnerability is being exploited in the wild and released emergency hotfixes for affected versions. CISA’s emergency order reflects the severe risk this flaw poses to government and private networks alike.
Vulnerability Details
Exploitation Activity
Fortinet confirmed attackers are exploiting the vulnerability in the wild, classifying it as a zero‑day. The exploitation involves unauthenticated actors sending crafted requests to bypass EMS API authorization entirely, gaining remote access and the ability to execute commands.
Shadowserver reports nearly 2,000 FortiClient EMS instances exposed online, with 1,400+ in the U.S. and Europe, highlighting the broad attack surface.
Threat Impact & Risk Assessment
|
Category |
Assessment |
|
Likelihood |
High – confirmed active exploitation |
|
Impact |
Critical – full authentication bypass + RCE |
|
Exposure |
Significant – ~2,000 instances online, many unpatched |
|
Overall Risk |
Severe – immediate exploitation risk |
CISA Directive and Deadlines
CISA has added CVE202635616 to the Known Exploited Vulnerabilities (KEV) Catalog, mandating all Federal Civilian Executive Branch (FCEB) agencies to patch by Thursday, April 9 (midnight) under Binding Operational Directive (BOD) 2201.
CISA warns that vulnerabilities of this type are frequent attack vectors and pose “significant risks” to federal enterprises. Although the directive applies only to federal agencies, CISA “strongly urges” all organizations—private sector included—to prioritize fast patching
Recommended Mitigations
Immediate Actions
If Mitigation Is Not Possible
CISA advises discontinuing use of the product if workable mitigations are unavailable