{"uuid": "789c020a-1c99-4750-8b02-5a6eebd93946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2026-35616", "type": "exploited", "source": "https://t.me/cibsecurity/88977", "content": "\ud83d\udd8b\ufe0f Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS \ud83d\udd8b\ufe0f\n\nFortinet has released outofband patches for a critical security flaw impacting FortiClient EMS that it said has been exploited in the\u00a0wild. The\u00a0vulnerability, tracked\u00a0as CVE202635616 CVSS score 9.1, has been described as a preauthentication API access bypass leading to privilege escalation. \"An improper access control vulnerability CWE284 in FortiClient EMS may allow an.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2026-04-05T05:45:10.000000Z"}