The threat came quickly and urgently: a critical vulnerability in FortiClient Enterprise Management Server (EMS), identified as CVE-2026-35616 It has forced the US authorities to order immediate action and has turned on alarms among security teams around the world. This is a failure that allows, according to the researchers who discovered it, to completely avoid authentication and authorization controls by specially designed requests, which opens the door to the execution of commands or code without the need for credentials.
Fortinet reacted by releasing emergency corrections over the weekend and warned that vulnerability is the result of a poor configuration in the access control of his API. The company also warned that malicious actors were already taking advantage of the failure in active attacks, and recommended installing the hotfixes available for the affected versions - branches 7.4.5 and 7.4.6 - or updating to version 7.4.7 when it is published.

The gravity of the problem led to the Cybersecurity and Infrastructure Security Agency (CISA) to include vulnerability in its A catalogue of known and exploited vulnerabilities (KEV) and to issue a binding order for federal agencies, demanding that all FortiClient EMS bodies be secured before the deadline indicated under the Binding Operational Directive 22-01. Although this directive formally applies to U.S. federal government entities, CISA urged all public and private organizations to prioritize the correction of the ruling.
The context makes the scenario even more worrying: the Shadowserver surveillance group maintains a public counter of FortiClient EMS instances accessible from the Internet and, according to its panel, there are close to 2,000 exposed EMS servers with more than 1,400 IP addresses located in the United States and Europe. This level of public exposure increases the risk of massive commitments, and the complicated thing is that there is no reliable public measurement of how many of these instances have already applied the patch.
Why is a failure in EMS particularly delicate? An endpoints management server centralizes policies, deployments and controls on FortiClient customers deployed in a network. Compromise that point means being able to pivote, deploy malware through the management infrastructure or disable security controls on multiple teams simultaneously. In other words, it is a high-value target for espionage and ransomware attacks.
Fortinet has asked its customers to install the hotfixes for the affected versions as soon as possible and, when the stable and corrected version (7.4.7) is available, to adopt it as a final route. In parallel, the CISA recommendation includes applying the supplier's mitigation, considering the suspension of the product if there are no possible mitigation and following the BOD 22-01 guidelines for cloud services. These indications are not merely formal: in practice they involve changing the exposure of servers, hardening access and reviewing audits and records in search of suspicious activity.
This episode is not isolated in the recent history of Fortinet. In the previous months the company published patches for other critical failures in its products, some of which were also reported as being exploited in real environments. This recurrence has turned certain Fortinet product families into preferred targets for sophisticated campaigns; therefore, each new vulnerability requires a rapid and coordinated response.
For an IT or security manager, the response window is narrow. In addition to applying the official hotfix or the recommended update, there are practical measures that can reduce the risk of operation while the patch is completed: restrict access to the EMS through access control lists and VPNs, move the management console out of direct access from the Internet, activate detailed registration and monitoring of unusual connections, and prepare response plans that include system isolation and integrity verification after remediation. It is also prudent to review administrative accounts, credentials and keys that may have been compromised and to rotate them where appropriate.

The dynamics of central management vulnerabilities show that modern cybersecurity is not only a technical exercise: it is an organizational issue. Updating software quickly, maintaining accurate inventories of exposed assets, and coordinating communication between security teams, operations and management are critical tasks to prevent a single failure from leading to a major incident.
If you manage FortiClient EMS, do not expect: check your server version, check the manufacturer's documentation and apply the hotfixes or recommended update. To consult the official notice of the US cybersecurity agency. UU and understand the compliance framework, you can review the CISA note in the previous link. To assess public exposure of EMS instances, the Shadowserver offers a view that, although it does not tell how many are patched, shows the magnitude of the deployment accessible from the Internet. And to look for Fortinet's official releases and notices about this and other vulnerabilities, the company's security ad page is a recommended starting point: Fortinet Product Security Annotations.
In the background, the lesson is clear: when an attack vector affects the management layer, the speed of response and operational hygiene make the difference between a controlled incident and a gap with extensive consequences. CISA's invitation to the private sector to act as urgently as federal agencies is not rhetoric; it is the call to prevent a shadow-exploited vulnerability from becoming a disaster in the eyes of all.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...