New FortiClient EMS flaw exploited in attacks, emergency patch released
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章内容和一个示例总结,所以我得先仔细阅读文章,理解其主要内容。 文章主要讲的是Fortinet发布了针对FortiClient Enterprise Management Server(EMS)的一个紧急安全更新,修复了一个被积极利用的严重漏洞CVE-2026-35616。这个漏洞允许未经身份验证的攻击者通过特制请求执行代码或命令。Fortinet在周末发布了补丁,并确认该漏洞已经在野外被利用。此外,网络安全公司Defused发现了这个漏洞,并报告给了Fortinet。Shadowserver监测到超过2000个暴露的EMS实例,主要在美国和德国。Fortinet敦促用户立即安装补丁或升级到即将发布的版本以降低风险。 接下来,我需要将这些信息浓缩到100字以内,同时避免使用“文章内容总结”之类的开头语。要确保涵盖关键点:漏洞名称、影响版本、攻击方式、已发布补丁、受影响实例数量以及建议措施。 可能会遇到的问题是如何在有限的字数内涵盖所有重要信息而不遗漏关键细节。需要精简语言,使用简洁的表达方式。 最后,检查字数是否符合要求,并确保信息准确无误。 </think> Fortinet发布紧急安全更新修复 FortiClient EMS 严重漏洞 CVE-2026-35616,该漏洞允许未认证攻击者执行代码或命令。已确认被野外利用,影响 7.4.5 和 7.4.6 版本,可通过安装热修复或升级至 7.4.7 解决。超过 2,000 个暴露实例被发现。 2026-4-5 19:0:23 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Fortinet

Fortinet has released an emergency weekend security update for a new critical FortiClient Enterprise Management Server (EMS) vulnerability that is actively exploited in attacks.

Tracked as CVE-2026-35616, the flaw is an improper access control vulnerability that allows unauthenticated attackers to execute code or commands via specially crafted requests.

The issue was patched Saturday, with Fortinet confirming it has been exploited in the wild.

"Fortinet has observed this to be exploited in the wild and urges vulnerable customers to install the hotfix for FortiClient EMS 7.4.5 and 7.4.6," warns Fortinet.

Fortinet says the vulnerability impacts FortiClient EMS versions 7.4.5 and 7.4.6 and can be mitigated by installing one of the following hotfixes:

The vulnerability will also be fixed in the upcoming FortiClientEMS 7.4.7. FortiClient EMS 7.2 is not affected.

The flaw was discovered by cybersecurity firm Defused, which described it as a pre-authentication API access bypass that allows attackers to bypass authentication and authorization controls entirely.

Defused shared on X that they observed the flaw being exploited as a zero-day earlier this week before reporting it to Fortinet under responsible disclosure.

Internet security watchdog Shadowserver has found over 2,000 exposed FortiClient EMS instances online, with the majority located in the USA and Germany.

The vulnerability follows a separate critical FortiClient EMS flaw, CVE-2026-21643, reported last week and also actively exploited in attacks.

Both vulnerabilities were discovered by Defused, with Fortinet also crediting Nguyen Duc Anh for the latest flaw.

Fortinet is urging customers to apply the hotfixes immediately or upgrade to version 7.4.7 when it becomes available to mitigate the risk of compromise.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh