ATLA WIRE

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

07.04.2026
13154
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Fortinet has released patches for a critical vulnerability (CVE-2026-35616, CVSS 9.1) in FortiClient EMS that has been actively exploited since March 31, 2026. The flaw affects versions 7.4.5 through 7.4.6 and enables privilege escalation attacks.

🚨 BREAKING: Fortinet Patches Critical Zero-Day Exploited in the Wild

Fortinet just dropped emergency patches for CVE-2026-35616—a nasty privilege escalation bug in FortiClient EMS that's been actively weaponized since March 31, 2026. CVSS score: 9.1 (aka 'patch this yesterday').
Affected versions: FortiClient EMS 7.4.5 through 7.4.6. If you're running these, attackers can jack up their privileges on your system. No details on the exploit yet, but Fortinet confirmed it's already being used in real attacks.
Article image 1
Fortinet's advisory is live—update to the latest patched version ASAP. This isn't a drill; threat actors are already hitting unpatched systems. Zero-day status means no prior warning, just pure chaos.
  • CVE-2026-35616
  • CVSS 9.1 (Critical)
  • Active exploitation since March 31, 2026
  • Affects FortiClient EMS 7.4.5–7.4.6
  • Privilege escalation vulnerability
  • Patches released by Fortinet
Tags tell the story: API Security, Vulnerability, zero day, privilege escalation. This is the kind of flaw that lets attackers pivot from low-level access to full system control. Patch management teams, wake up—your weekend just got booked.
#Fortinet#security patches#CVE vulnerabilities#zero-day vulnerabilities#privilege escalation
Got a topic? Write to ATLA WIRE on Telegram:t.me/atla_community
Banner | ATLA WIRE
ATLA WIRE