Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Fortinet Rushes Emergency Fixes for Exploited Zero-Day
    Cybersecurity

    Fortinet Rushes Emergency Fixes for Exploited Zero-Day

    adminBy adminApril 6, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Fortinet patches
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Fortinet over the weekend rushed emergency fixes for a FortiClient Enterprise Management Server (EMS) vulnerability that has been exploited as a zero-day.

    Described as an improper access control issue, the critical-severity flaw is tracked as CVE-2026-35616 (CVSS score of 9.1) and could be exploited for remote code execution (RCE).

    According to Fortinet’s advisory, remote attackers could send crafted requests to a vulnerable FortiClient EMS to trigger the bug. Successful exploitation does not require authentication, it says.

    “Fortinet has observed this to be exploited in the wild,” the company warned.

    On Saturday, Fortinet announced the availability of hotfixes to address the security defect in FortiClient EMS versions 7.4.5 and 7.4.6, noting that version 7.2 is not affected.

    The company also published detailed instructions on how to download and apply the hotfixes for both FortiClient EMS 7.4.5 and 7.4.6, and on how to verify that the hotfixes have been applied.

    Advertisement. Scroll to continue reading.

    “Upcoming FortiClientEMS 7.4.7 will also include a fix for this issue. In the meantime, the hotfix above is sufficient to prevent it entirely,” Fortinet said.

    The company credited “Defused” for finding and reporting the flaw. According to the cybersecurity firm, the vulnerability allows unauthenticated attackers to bypass API authentication and authorization.

    “After observing in-the-wild exploitation of this vulnerability earlier this week, Defused reported it to Fortinet under responsible disclosure,” the cybersecurity company said on Saturday.

    Non-profit organization The Shadowserver Foundation says it has observed approximately 2,000 FortiClient EMS instances that are accessible from the internet.

    These instances, it notes, are potentially exposed to attacks exploiting the new zero-day, as well as CVE-2026-21643, a recently patched SQL injection that has been exploited for over a week.

    Related: TrueConf Zero-Day Exploited in Asian Government Attacks

    Related: React2Shell Exploited in Large-Scale Credential Harvesting Campaign

    Related: Exploited Zero-Day Among 21 Vulnerabilities Patched in Chrome

    Related: Cisco Firewall Vulnerability Exploited as Zero-Day in Interlock Ransomware Attacks

    Emergency Exploited fixes Fortinet Rushes ZeroDay
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThe CMF Watch 3 Pro With AI-Powered Tracking Is on Sale for $45 Right Now
    Next Article How to Setup a WordPress Appointment Booking System & Book Clients 24/7
    admin
    • Website

    Related Posts

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    GitHub lays out copyright liability changes and upcoming DMCA review for developers

    April 16, 2026

    New AgingFly malware used in attacks on Ukraine govt, hospitals

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026

    Opera’s browsers just picked up a new AI feature that’s actually useful

    April 16, 2026

    GitHub lays out copyright liability changes and upcoming DMCA review for developers

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,342)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (822)
    • Tech Tools & Mobile / Apps (1,604)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026

    Opera’s browsers just picked up a new AI feature that’s actually useful

    April 16, 2026
    Most Popular
    • UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
    • Why Your Search Data Doesn’t Agree (And What To Do About It)
    • Opera’s browsers just picked up a new AI feature that’s actually useful
    • GitHub lays out copyright liability changes and upcoming DMCA review for developers
    • Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited
    • New AgingFly malware used in attacks on Ukraine govt, hospitals
    • Capsule Security Emerges From Stealth With $7 Million in Funding
    • NYT Strands hints and answers for Thursday, April 16 (game #774)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.