VulnerabilitiesCritical

Fortinet FortiClient EMS CVE-2026-35616 Added to CISA KEV — Active Exploitation Confirmed

Wednesday, April 8, 2026
Global
CISA KEV

Summary

CISA added CVE-2026-35616 affecting Fortinet FortiClient EMS to its Known Exploited Vulnerabilities catalog on April 6, 2026, confirming active exploitation in the wild. FortiClient EMS is widely deployed in enterprise environments for endpoint management and VPN connectivity. Organizations using FortiClient EMS must apply available patches immediately.

Threat Analysis

CVE-2026-35616 is a vulnerability in Fortinet FortiClient EMS (Endpoint Management Server) that has been confirmed as actively exploited in the wild, prompting CISA to add it to the Known Exploited Vulnerabilities catalog on April 6, 2026. FortiClient EMS is a centralized management platform used by enterprises to manage FortiClient endpoint security software, including VPN configurations, compliance policies, and security profiles. Exploitation of this vulnerability could allow attackers to compromise the EMS server, potentially gaining access to endpoint configurations, VPN credentials, and the ability to push malicious configurations to managed endpoints. Given FortiClient EMS's role in managing enterprise VPN access, successful exploitation could provide attackers with a foothold into corporate networks. Mitigations: Apply Fortinet's security patches for FortiClient EMS immediately. Review FortiClient EMS access logs for signs of unauthorized access. Ensure FortiClient EMS is not directly exposed to the internet. Implement network segmentation to limit the blast radius of a potential compromise. Monitor for unusual configuration changes pushed to managed endpoints.

Last updated: Apr 8, 2026, 08:18 AM

Daily Intelligence

Stay Ahead of Threats

Subscribe to receive daily threat briefings delivered to your inbox. Be the first to know about emerging security risks.

No spamUnsubscribe anytimeDaily at 9 AM