Close Menu
geekfence.comgeekfence.com
    What's Hot

    Iran War: How far will Trump go after war crime threats?

    April 7, 2026

    OnePlus Nord 6 5G Launched in India: Price and Specifications

    April 7, 2026

    Enabling agent-first process redesign | MIT Technology Review

    April 7, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»New Fortinet Flaw Allows Unauthorized Access to Enterprise Systems
    Cyber Security

    New Fortinet Flaw Allows Unauthorized Access to Enterprise Systems

    AdminBy AdminApril 7, 2026No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    New Fortinet Flaw Allows Unauthorized Access to Enterprise Systems
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Cybersecurity concept image of a glowing digital padlock icon over financial data charts and a human hand.
    image: envato by GoldenDayz

    Fortinet disclosed a critical FortiClient EMS vulnerability that is already being exploited in the wild.

    The flaw could allow unauthenticated attackers to bypass API protections and execute unauthorized code or commands on exposed systems.

    “This is a zero-day. While there is no full patch, we have to give credit where credit is due: Fortinet has rushed out a hotfix over a holiday weekend, which reflects how urgently the company is treating this,” said Benjamin Harris, CEO and founder of watchTowr, in an email to eSecurityPlanet.

    He added, “watchTowr’s Attacker Eye honeypot infrastructure is currently capturing active exploitation of CVE-2026-35616. Attacker Eye sensors first captured exploitation activity on March 31st, days before today’s public disclosure, in what appeared to be early probes ahead of a full ramp-up.”

    1
    Corsica Technologies

    Employees per Company Size

    Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

    Any Company Size
    Any Company Size

    Features

    Activity Monitoring, Antivirus, Blacklisting, and more

    2
    Graylog

    Employees per Company Size

    Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

    Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees)
    Small, Medium, Large, Enterprise

    Features

    Activity Monitoring, Dashboard, Notifications

    3
    Ready1

    Employees per Company Size

    Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

    Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees)
    Small, Medium, Large, Enterprise

    Features

    Incident Management

    Inside the FortiClient EMS vulnerability

    FortiClient EMS should be treated as critical management infrastructure, not just another endpoint tool. It sits in a highly privileged position within the enterprise, responsible for managing, configuring, and enforcing security controls across endpoint fleets.

    If attackers gain control of this layer, they may be able to interfere with endpoint protections, push malicious configurations, execute commands at scale, or abuse administrative trust to move laterally across the environment.

    The flaw, CVE-2026-35616, affects recently deployed versions of FortiClient EMS, and Fortinet has already issued hotfixes while customers await a permanent fix in an upcoming release. This also marks the second critical FortiClient EMS vulnerability to be actively exploited in recent months, following CVE-2026-21643.

    While it is not yet clear whether the same threat actor is behind both campaigns or whether the vulnerabilities are being chained together, the pattern suggests attackers are actively probing FortiClient EMS as a high-value entry point into enterprise environments.

    Breakdown of CVE-2026-35616

    CVE-2026-35616 is a pre-authentication API access bypass that can lead to privilege escalation, with a CVSS score of 9.1.

    The root cause is improper access control, which allows attackers to send specially crafted API requests that bypass authentication and authorization checks. Basically, the system fails to properly verify whether a request should be allowed, opening the door to unauthorized actions.

    This combination lowers the barrier to exploitation, as the pre-authentication vulnerability allows attackers to interact with the target system without valid credentials.

    If the EMS instance is reachable — particularly if it is exposed to the internet or insufficiently segmented — attackers can directly attempt to exploit it, moving from access bypass to unauthorized command execution.

    Reducing risk in EMS environments

    To reduce the risk of exploitation, organizations should enforce appropriate access controls in EMS environments.

    • Apply the latest hotfix and validate that the fix has been successfully implemented.
    • Restrict EMS access to trusted internal networks, VPNs, or jump boxes and remove unnecessary internet exposure.
    • Place EMS behind firewall allowlists or access control lists to limit API and administrative access.
    • Review logs and telemetry for suspicious API activity, unauthorized commands, or anomalous administrative behavior.
    • Monitor the EMS host for signs of persistence, including new services, scheduled tasks, scripts, or unexpected outbound connections.
    • Audit and reduce the number of privileged accounts, service accounts, and API permissions, and rotate credentials if a compromise is suspected.
    • Test incident response and disaster recovery plans to ensure teams can quickly contain and rebuild EMS infrastructure if needed.

    Together, these measures help build resilience and limit the blast radius of any potential compromise.

    Editor’s note: This article originally appeared on our sister publication, eSecurityPlanet.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Complicated vs. Complex: Why Modern Healthcare Demands a Unique Approach to Cybersecurity

    April 6, 2026

    Nigerian romance scammer jailed after being caught out by fellow fraudster

    April 5, 2026

    Google Workspace’s continuous approach to mitigating indirect prompt injections

    April 4, 2026

    Microsoft still working to fix Exchange Online mailbox access issues

    April 3, 2026

    Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories

    April 2, 2026

    Feds Disrupt IoT Botnets Behind Huge DDoS Attacks – Krebs on Security

    April 1, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202527 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202624 Views

    Redefining AI efficiency with extreme compression

    March 25, 202622 Views
    Don't Miss

    Iran War: How far will Trump go after war crime threats?

    April 7, 2026

    This story appeared in Today, Explained, a daily newsletter that helps you understand the most…

    OnePlus Nord 6 5G Launched in India: Price and Specifications

    April 7, 2026

    Enabling agent-first process redesign | MIT Technology Review

    April 7, 2026

    Data Annotation Outsourcing and Risk Mitigation Strategies

    April 7, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Iran War: How far will Trump go after war crime threats?

    April 7, 2026

    OnePlus Nord 6 5G Launched in India: Price and Specifications

    April 7, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.