
The flaw, tracked as CVE-2026-35616, was officially added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on April 6, 2026.
Inclusion in the KEV list signals that threat actors are not only aware of the issue but are actively abusing it, making it an immediate priority for defenders.
CISA’s KEV catalog plays a key role in helping security teams focus on the most dangerous vulnerabilities.
With thousands of new flaws disclosed every year, the catalog highlights those that pose real, ongoing threats, allowing organizations to act quickly and reduce risk.
CVE-2026-35616 affects Fortinet’s FortiClient Enterprise Management Server (EMS), a widely deployed tool used by organizations to manage endpoint security across corporate networks.
FortiClient EMS allows administrators to enforce policies, deploy updates, and monitor connected devices, making it a critical component of enterprise security infrastructure.
The vulnerability stems from an improper access control issue, classified under CWE-284. This weakness allows remote, unauthenticated attackers to bypass authentication mechanisms entirely.
By sending specially crafted requests to a vulnerable server, attackers can execute unauthorized commands without needing valid login credentials.
Because FortiClient EMS operates at the core of network security management, successful exploitation can have severe consequences.
Attackers could gain control over managed endpoints, steal sensitive corporate data, or establish long-term persistence within the environment.
In large enterprises, this could effectively give adversaries control over large portions of the network.
While CISA has not confirmed whether the vulnerability is currently being used in ransomware campaigns, its active exploitation status significantly increases the risk level.
Security experts warn that vulnerabilities of this nature are often quickly adopted by ransomware operators once public awareness grows.
To mitigate the threat, CISA is urging organizations to take immediate action. Security teams should apply all available patches and follow Fortinet’s official mitigation guidance without delay.
Organizations are also advised to review the requirements of Binding Operational Directive (BOD) 22-01, particularly for cloud-connected systems.
If patches or mitigations are not immediately available, CISA recommends discontinuing the use of affected FortiClient EMS instances until they can be secured.
Due to the severity of the threat, CISA has set a strict remediation deadline. Federal Civilian Executive Branch (FCEB) agencies must address the vulnerability by April 9, 2026.
Private sector organizations are strongly encouraged to follow the same timeline to prevent potential compromise.
With active exploitation already underway, CVE-2026-35616 represents a high-priority risk that demands immediate attention from network defenders worldwide.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post CISA Alerts on Actively Exploited Fortinet 0-Day Vulnerability appeared first on Cyber Security News.
Discover more from RSS Feeds Cloud
Subscribe to get the latest posts sent to your email.
