New FortiClient EMS flaw exploited in attacks, emergency patch released
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100个字以内,而且不需要特定的开头,直接写描述。 首先,我快速浏览文章内容。文章主要讲的是Fortinet发布了针对FortiClient EMS漏洞的紧急补丁。这个漏洞被追踪为CVE-2026-35616,是一个未授权访问控制问题,允许攻击者执行恶意代码。该漏洞已经被利用,影响了7.4.5和7.4.6版本,并且有超过2000个暴露实例。 接下来,我需要提取关键信息:Fortinet发布紧急补丁、漏洞编号、影响版本、已遭利用、修复建议以及受影响的实例数量。 然后,我要把这些信息浓缩到100字以内。确保包含所有重要点:补丁发布、漏洞详情、影响范围、修复措施和暴露情况。 最后,组织语言,使其简洁明了。比如:“Fortinet发布针对FortiClient EMS漏洞CVE-2026-35616的紧急补丁,该漏洞允许未授权攻击者执行恶意代码。该漏洞影响7.4.5和7.4.6版本,并已遭利用。用户应立即安装热修复程序或升级至7.4.7以缓解风险。已有超2000个暴露实例。” 这样既涵盖了所有要点,又符合字数要求。 </think> Fortinet发布针对FortiClient EMS漏洞CVE-2026-35616的紧急补丁,该漏洞允许未授权攻击者执行恶意代码。该漏洞影响7.4.5和7.4.6版本,并已遭利用。用户应立即安装热修复程序或升级至7.4.7以缓解风险。已有超2000个暴露实例。 2026-4-5 18:45:20 Author: www.bleepingcomputer.com(查看原文) 阅读量:19 收藏

Fortinet

Fortinet has released an emergency weekend security update for a new critical FortiClient Enterprise Management Server (EMS) vulnerability that is actively exploited in attacks.

Tracked as CVE-2026-35616, the flaw is an improper access control vulnerability that allows unauthenticated attackers to execute code or commands via specially crafted requests.

The issue was patched Saturday, with Fortinet confirming it has been exploited in the wild.

"Fortinet has observed this to be exploited in the wild and urges vulnerable customers to install the hotfix for FortiClient EMS 7.4.5 and 7.4.6," warns Fortinet.

Fortinet says the vulnerability impacts FortiClient EMS versions 7.4.5 and 7.4.6 and can be mitigated by installing one of the following hotfixes:

The vulnerability will also be fixed in the upcoming FortiClientEMS 7.4.7. FortiClient EMS 7.2 is not affected.

The flaw was discovered by cybersecurity firm Defused, which described it as a pre-authentication API access bypass that allows attackers to bypass authentication and authorization controls entirely.

Defused shared on X that they observed the flaw being exploited as a zero-day earlier this week before reporting it to Fortinet under responsible disclosure.

Internet security watchdog Shadowserver has found over 2,000 exposed FortiClient EMS instances online, with the majority located in the USA and Germany.

The vulnerability follows a separate critical FortiClient EMS flaw, CVE-2026-21643, reported last week and also actively exploited in attacks.

Both vulnerabilities were discovered by Defused, with Fortinet also crediting Nguyen Duc Anh for the latest flaw.

Fortinet is urging customers to apply the hotfixes immediately or upgrade to version 7.4.7 when it becomes available to mitigate the risk of compromise.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/new-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh