Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade to upcoming FortiClientEMS version 8.0.0 or above Upgrade to FortiClientEMS version 7.4.7 or above
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated Remote Code Execution via Improper Access Control in FortiClientEMS 7.4.5–7.4.6 |
Wed, 22 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated Remote Code Execution via Improper Access Control in FortiClientEMS 7.4.5–7.4.6 |
Wed, 22 Apr 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated Remote Code Execution in FortiClientEMS 7.4.5-7.4.6 |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthenticated Remote Code Execution in FortiClientEMS 7.4.5-7.4.6 |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
ssvc
|
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Sat, 04 Apr 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 04 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests. | |
| First Time appeared |
Fortinet
Fortinet forticlientems |
|
| Weaknesses | CWE-284 | |
| CPEs | cpe:2.3:a:fortinet:forticlientems:7.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientems:7.4.6:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet forticlientems |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-04-21T08:35:09.619Z
Reserved: 2026-04-03T23:49:34.986Z
Link: CVE-2026-35616
Updated: 2026-04-04T10:53:23.244Z
Status : Analyzed
Published: 2026-04-04T01:16:39.720
Modified: 2026-04-06T18:12:57.863
Link: CVE-2026-35616
No data.
OpenCVE Enrichment
Updated: 2026-05-06T16:30:06Z