Home Cybersecurity Disaster Recovery Identity Security AI Governance Sectors IT Services About Insights Contact
Cybersecurity

Critical FortiClient EMS Zero-Day Exposes UK Enterprise Networks Through Authentication Bypass

5 April 2026 · 3 min read

← All insights

A critical zero-day vulnerability in Fortinet's FortiClient EMS is under active exploitation, allowing attackers to bypass authentication and execute arbitrary code on endpoint management systems widely deployed across UK mid-market organisations. CVE-2026-35616 represents an immediate threat to enterprise network security, with attackers requiring no prior credentials to compromise affected systems.

Fortinet confirmed the flaw carries a CVSS score of 9.1 and affects FortiClient EMS versions 7.4.5 and 7.4.6. FortiClient EMS is an endpoint management system that centralises security policy deployment, monitoring, and control across enterprise devices - making it a high-value target for attackers seeking lateral movement capabilities.

Key Facts:
- CVE-2026-35616 enables unauthenticated remote code execution via crafted API requests
- Active exploitation confirmed by Fortinet with emergency hotfixes now available
- Vulnerability affects FortiClient EMS versions 7.4.5 and 7.4.6 with CVSS score of 9.1
- Endpoint management systems provide privileged access to enterprise device fleets

What Makes This Vulnerability So Dangerous?

According to reporting from Help Net Security, the authentication bypass allows attackers to send specially crafted API requests to FortiClient EMS servers, gaining unauthorised access without valid credentials. This creates a direct pathway into enterprise networks through systems specifically designed to manage endpoint security policies. The vulnerability's severity stems from FortiClient EMS's privileged position within network infrastructure - compromise of these systems can facilitate mass deployment of malware across managed endpoints or extraction of sensitive configuration data.

The active exploitation timeline suggests organised threat actors have developed working exploits, potentially targeting the substantial installed base of Fortinet products across UK organisations. Similar supply chain-style attacks have demonstrated how attackers leverage trusted infrastructure components to achieve broad network compromise.

Emergency Response Requirements

Fortinet has released emergency hotfixes for affected versions, but the narrow update window creates implementation challenges for UK organisations managing distributed endpoint fleets. The NCSC's guidance on critical vulnerability management emphasises immediate patching for actively exploited flaws, particularly those affecting network infrastructure components. Organisations must balance rapid deployment against potential service disruption during emergency maintenance windows.

Temporary mitigation involves restricting API access through network segmentation and implementing additional authentication layers where possible. However, these measures provide limited protection against an authentication bypass vulnerability, making urgent patching the primary defence strategy.

Boardroom Questions

Quick Diagnostic

PTG Intelligence Desk
Pacific Technology Group

Related Reading

First Major Victim Emerges From AI Supply Chain Attack That Hit 500,000 Systems — AI hiring startup Mercor becomes first public victim of LiteLLM supply-chain attack affecting 500,000 systems globally.

Critical SAML Flaw Gives Attackers Instant Access to UK Enterprise Systems — NCSC urgent advisory warns of critical Citrix NetScaler vulnerabilities affecting SAML authentication with memory overre

TeamPCP's Audio Steganography Attack Hides Malware Inside 740K-Download Python Package — Supply chain attackers compromised the Telnyx PyPI package, embedding credential stealers inside WAV audio files to evad

Critical Citrix Memory Leak Flaw Threatens UK Enterprise Single Sign-On Systems — CVE-2026-3055 enables unauthenticated attackers to extract sensitive authentication data from Citrix NetScaler SAML conf

Critical Oracle Identity Manager Zero-Day Leaves UK Enterprises Exposed to Unauthenticated Takeover — Oracle's emergency patch for CVE-2026-21992 addresses critical 9.8 CVSS vulnerability in Identity Manager allowing unaut

Strengthen your organisation's security posture

Take the PTG Cyber Assessment Speak With Our Advisory Team

Ready to strengthen your cyber resilience?

Talk to our team about protecting your organisation against evolving threats.

Get in Touch