
Intro
CVE-2026-35616 is actively being exploited in the wild. Fortinet has issued an emergency hotfix for FortiClient EMS after confirming unauthenticated remote code execution via crafted requests. This is a live-fire situation on exposed EMS servers.
π CVE Context
– Products & versions affected: FortiClient EMS 7.4.5 and 7.4.6
– Disclosure timeline: Published April 3, 2026; active exploitation confirmed April 4, 2026
– Attack vector: Remote (network)
– Privileges required: None
– User interaction: None
– Impact: Unauthenticated attackers can execute arbitrary commands via crafted requests (CWE-284 Improper Access Control)
CVSS Metric Breakdown (v4.0) - CVE-2026-35616 (FortiClient EMS unauthenticated RCE)Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneConfidentiality Impact (VC): HighIntegrity Impact (VI): HighAvailability Impact (VA): HighScope Changed (SC): NoSafety Impact (SI): NoneAutomation (SA): HighExploit Maturity: ActiveBase Score: 9.8 (Critical)
– Confirmed exploitation in the wild
– Emergency hotfix released by Fortinet
– Added to VulnCheck KEV catalog (CISA KEV pending)
π― EPSS Scoring
EPSS Probability: 0.00034
Percentile: 0.10127
π¬ Exploitation Detail
– Improper access control allows unauthenticated API access
– Crafted requests bypass authentication checks entirely
– Backend EMS service executes attacker-controlled commands
POST /api/ HTTP/1.1Host: targetaction=exec&cmd=whoami
π Attacker Behavior Snapshot
– Attacker scans for exposed EMS servers
– Sends crafted unauthenticated request
– EMS processes request as trusted input
– Command execution occurs under service context
– Output confirmed via response or system behavior
π§© Why This Matters
This vulnerability targets a centralized endpoint management system. Compromise here gives attackers direct leverage over managed endpoints and security posture.
Exploitation results in:
- Full command execution on EMS servers
- Control over endpoint management workflows
- Rapid lateral movement into managed devices
π§© MITRE ATT&CK Mapping
Initial Access: T1190 β Exploit Public-Facing Application
Execution: T1059.003 β Command Shell
Persistence: T1505.003 β Server Software Component
π§ͺ Detection Rules
YARA Rule (Memory/Doc/PCAP)
rule Fortinet_EMS_CVE_2026_35616{ meta: description = "Detects command execution patterns from EMS" strings: $cmd1 = "cmd.exe /c" $cmd2 = "powershell.exe" condition: any of them}
Suricata or Zeek (Network)
alert http any any -> any any (msg:"Fortinet EMS RCE Attempt CVE-2026-35616"; content:"/api/"; http_uri; sid:3561601; rev:1;)
Sigma Rule (SIEM/EDR)
title: Fortinet EMS Unexpected Command Executionlogsource: category: process_creationdetection: selection: ParentImage|contains: "FortiClientEMS" CommandLine|contains: - "cmd.exe" - "powershell" condition: selectionlevel: critical
π Detection Strategies
β Network Detection:
- Monitor EMS API endpoints for unauthenticated requests
- Detect abnormal POST requests to EMS services
- Look for command strings in HTTP payloads
β Endpoint Detection:
- FortiClientEMS spawning cmd.exe or powershell.exe
- Unexpected execution chains from EMS services
- New processes without associated user sessions
β‘ Splunk Query
index=endpoint_logs sourcetype=sysmon
ParentImage="*FortiClientEMS*"
(CommandLine="*cmd.exe*" OR CommandLine="*powershell*")
| stats count by host, user, process
π οΈ SOC Detection Strategy
– Treat any EMS-originated command execution as critical
– Correlate network + process telemetry immediately
– Escalate without delay β no βwait and seeβ on this one
π οΈ Tools & Techniques
Sysmon | Process lineage from EMS services
Velociraptor | Hunt for execution artifacts
Zeek | HTTP anomaly detection
Sigma/YARA | Detect command execution patterns
π‘οΈ Mitigation & Response
– Apply Fortinet emergency hotfix immediately
– Restrict EMS access to internal networks only
– Block external exposure at firewall/WAF level
– Audit EMS servers for signs of compromise
– Monitor for lateral movement into endpoints
π Incident Response Snippets
– Identify EMS-originated process execution
– Review API logs for unauthenticated access
– Hunt for lateral movement from EMS host
– Validate integrity of managed endpoints
π Suggested Reading & External References
– Fortinet Advisory (FG-IR-26-099)
– VulnCheck KEV catalog entry
– Research notes from runZero analysis
πΎοΈ Final Thoughts
Unauthenticated remote access to a management plane is immediate compromise.
Patch now, restrict access, and assume exposure until proven otherwise.
Published: April 4, 2026
Leave a comment