[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"focus:fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems-mnn9me4z":3},{"item":4},{"id":5,"title":6,"slug":7,"summary":8,"severity":9,"category":10,"cve_ids":11,"affected_products":13,"action_required":16,"article_ids":17,"ioc_summary":19,"source_urls":20,"status":22,"expires_at":23,"created_at":24,"updated_at":25,"articles":26},"d1987c30-fb00-44c1-9623-49cad07e4e65","Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS","fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems-mnn9me4z","Fortinet released emergency patches for CVE-2026-35616, a critical pre-authentication RCE vulnerability in FortiClient EMS 7.4.5-7.4.6 (CVSS 9.1). This vulnerability is actively being exploited in the wild as of March 31, 2026. Unauthenticated attackers can execute arbitrary code via malicious API requests.","critical","advisory",[12],"CVE-2026-35616",[14,15],"Fortinet","FortiClient EMS","Immediately patch all FortiClient EMS instances to the latest patched version. If patching cannot be completed today, isolate affected EMS servers from production networks and monitor API traffic for suspicious requests to unauthenticated endpoints.",[18],"452c9851-1a69-4761-a555-2f6284b22dff",null,[21],"https:\u002F\u002Fthehackernews.com\u002F2026\u002F04\u002Ffortinet-patches-actively-exploited-cve.html","archived","2026-04-08T14:08:05.157+00:00","2026-04-06T14:08:07.296333+00:00","2026-04-08T14:09:00.855281+00:00",[27],{"id":18,"title":6,"url":21}]